-
1
-
-
0003237987
-
The Kerberos Network Authentication Service (V5)
-
Kohl, J. and Neuman, C. (1993) The Kerberos Network Authentication Service (V5). Internet Request for Comments 1510.
-
(1993)
Internet Request for Comments
, pp. 1510
-
-
Kohl, J.1
Neuman, C.2
-
2
-
-
21144468597
-
KryptoKnight Authentication and Key Distribution System
-
Proc. 1992 European Symp. Research in Computer Security, ESORICS,Toulouse, France, November 23-25, pp, Springer, Berlin
-
Molva, R., Tsudik, G., Herreweghen, E.V. and Zatti, S. (1992) KryptoKnight Authentication and Key Distribution System. Proc. 1992 European Symp. Research in Computer Security - ESORICS,Toulouse, France, November 23-25, pp. 1-16, Lecture Notes in Computer Science, Vol. 648. Springer, Berlin.
-
(1992)
Lecture Notes in Computer Science
, vol.648
, pp. 1-16
-
-
Molva, R.1
Tsudik, G.2
Herreweghen, E.V.3
Zatti, S.4
-
3
-
-
84873466407
-
Authenticated Key Exchange Secure Against Dictionary Attacks
-
Eurocrypt 2000, Belgium, May 14-18, pp, Springer, Berlin
-
Bellare, M., Pointcheval, D. and Rogaway, P. (2000) Authenticated Key Exchange Secure Against Dictionary Attacks. Eurocrypt 2000, Belgium, May 14-18, pp. 139-155, Lecture Notes in Computer Science, Vol. 1807. Springer, Berlin.
-
(2000)
Lecture Notes in Computer Science
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
4
-
-
0002805220
-
Undetectable on-line password guessing attacks
-
Ding, Y. and Horster, P. (1995) Undetectable on-line password guessing attacks. ACM Oper. Syst. Rev., 29, 77-86.
-
(1995)
ACM Oper. Syst. Rev
, vol.29
, pp. 77-86
-
-
Ding, Y.1
Horster, P.2
-
5
-
-
69649087201
-
-
IEEE P1363.2: Password-based public-key cryptography. http:// grouper.ieee.org/groups/1363/passwdPK/index.html.
-
IEEE P1363.2: Password-based public-key cryptography. http:// grouper.ieee.org/groups/1363/passwdPK/index.html.
-
-
-
-
6
-
-
0002839106
-
Refinement and extension of encrypted key exchange
-
Steiner, M., Tsudik, G. and Wainder, M. (1995) Refinement and extension of encrypted key exchange. ACM Oper. Syst. Rev., 29, 22-30.
-
(1995)
ACM Oper. Syst. Rev
, vol.29
, pp. 22-30
-
-
Steiner, M.1
Tsudik, G.2
Wainder, M.3
-
7
-
-
0008145442
-
Three party-encrypted key exchange: Attacks and a solution
-
Lin, C.L., Sun, H.M. and Hwang, T. (2000) Three party-encrypted key exchange: Attacks and a solution. ACM Oper. Syst. Rev., 34, 12-20.
-
(2000)
ACM Oper. Syst. Rev
, vol.34
, pp. 12-20
-
-
Lin, C.L.1
Sun, H.M.2
Hwang, T.3
-
8
-
-
9544230689
-
Secure key agreement protocols for three-party against guessing attacks
-
Sun, H.M., Chen, B.C. and Hwang, T. (2005) Secure key agreement protocols for three-party against guessing attacks. J. Syst. Softw. 75, 63-68.
-
(2005)
J. Syst. Softw
, vol.75
, pp. 63-68
-
-
Sun, H.M.1
Chen, B.C.2
Hwang, T.3
-
9
-
-
2342566530
-
Anovel three-party encrypted key exchange protocol
-
Chang, C.C. and Chang, Y.F. (2004)Anovel three-party encrypted key exchange protocol. Compu. Stand. Interfaces, 26, 471-476.
-
(2004)
Compu. Stand. Interfaces
, vol.26
, pp. 471-476
-
-
Chang, C.C.1
Chang, Y.F.2
-
10
-
-
34948903343
-
Three weaknesses in a simple three-party key exchange protocol
-
Chung, H.R. and Ku, W.C. (2008) Three weaknesses in a simple three-party key exchange protocol. Inf. Sci., 178, 220-229.
-
(2008)
Inf. Sci
, vol.178
, pp. 220-229
-
-
Chung, H.R.1
Ku, W.C.2
-
11
-
-
8344221264
-
Enhanced three-party encrypted key exchange without server public keys
-
Lee, T.F., Hwang, T. and Lin, C.L. (2004) Enhanced three-party encrypted key exchange without server public keys. Comput. Secur., 23, 571-577.
-
(2004)
Comput. Secur
, vol.23
, pp. 571-577
-
-
Lee, T.F.1
Hwang, T.2
Lin, C.L.3
-
12
-
-
0035701459
-
Three-party encrypted key exchange without server public-keys
-
Lin, C.L., Sun, H.M., Steiner, M. and Hwang, T. (2001) Three-party encrypted key exchange without server public-keys. IEEE Commun. Lett. 5, 497-499.
-
(2001)
IEEE Commun. Lett
, vol.5
, pp. 497-499
-
-
Lin, C.L.1
Sun, H.M.2
Steiner, M.3
Hwang, T.4
-
13
-
-
33846817471
-
Simple three-party key exchange protocol
-
Lu, R. and Cao, Z. (2007) Simple three-party key exchange protocol. Comput. Secur., 26, 94-97.
-
(2007)
Comput. Secur
, vol.26
, pp. 94-97
-
-
Lu, R.1
Cao, Z.2
-
14
-
-
32244432466
-
Attack on the Sun-Chen-Hwang's three-party key agreement protocols using passwords
-
Nam, J., Kim, S. and Won, D. (2006) Attack on the Sun-Chen-Hwang's three-party key agreement protocols using passwords. IEICE Trans. Fundam. Electron. Commun. Comput. Sci., E89-A, 209-212.
-
(2006)
IEICE Trans. Fundam. Electron. Commun. Comput. Sci
, vol.E89-A
, pp. 209-212
-
-
Nam, J.1
Kim, S.2
Won, D.3
-
15
-
-
45849121373
-
Highly Efficient Password-Based Three-Party Key Exchange in Random Oracle Model
-
Proc. IEEE ISI 2008 Taiwan, June 17-20, pp, Springer, Berlin
-
Chien, H.-Y. and Wu, T.-C. (2008) Highly Efficient Password-Based Three-Party Key Exchange in Random Oracle Model. Proc. IEEE ISI 2008 Taiwan, June 17-20, pp. 69-76, Lecture Notes in Computer Science, Vol. 5075. Springer, Berlin.
-
(2008)
Lecture Notes in Computer Science
, vol.5075
, pp. 69-76
-
-
Chien, H.-Y.1
Wu, T.-C.2
-
16
-
-
0029531472
-
Optimal Authentication Protocols Resistant to Password Guessing Attacks
-
Ireland, June 13-15, pp, IEEE
-
Gong, L. (1995) Optimal Authentication Protocols Resistant to Password Guessing Attacks. Proc. 8th IEEE Workshop on Computer Security Foundations, Ireland, June 13-15, pp. 24-29. IEEE.
-
(1995)
Proc. 8th IEEE Workshop on Computer Security Foundations
, pp. 24-29
-
-
Gong, L.1
-
17
-
-
0027744838
-
Lower Bounds on Messages and Rounds for Network Authentication Protocols
-
Fair-fax,Virginia, November 3-5, pp, ACM press
-
Gong, L. (1993) Lower Bounds on Messages and Rounds for Network Authentication Protocols. Proc. 1st ACM Conf. Computer and Communications Security 1993, Fair-fax,Virginia, November 3-5, pp. 26-37. ACM press.
-
(1993)
Proc. 1st ACM Conf. Computer and Communications Security 1993
, pp. 26-37
-
-
Gong, L.1
-
18
-
-
46749107236
-
Selectively convertible authenticated encryption in the random oracle model
-
Chien, H.-Y. (2008) Selectively convertible authenticated encryption in the random oracle model. Comput. J., 51, 419-434.
-
(2008)
Comput. J
, vol.51
, pp. 419-434
-
-
Chien, H.-Y.1
-
19
-
-
84957629783
-
Relations Among Notations of Security for Public Key Encryption Schemes
-
Proc. CRYPTO'98, Santa Barbara, CA, USA, August 23-27, pp, Springer, Berlin
-
Bellare, M., Desai, A., Pointcheval, D. and Rogaway, P. (1998) Relations Among Notations of Security for Public Key Encryption Schemes. Proc. CRYPTO'98, Santa Barbara, CA, USA, August 23-27, pp. 26-45, Lecture Notes in Computer Science, Vol. 1462. Springer, Berlin.
-
(1998)
Lecture Notes in Computer Science
, vol.1462
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
20
-
-
0001940580
-
Provably secure session key distribution: The three party case
-
Nevada, USA, May 29-June 1, pp, ACM press
-
Bellare, M. and Rogaway, P. (1995) Provably secure session key distribution: The three party case. Proc. 27th ACM Symp. Theory of Computing, Nevada, USA, May 29-June 1, pp. 57-66. ACM press.
-
(1995)
Proc. 27th ACM Symp. Theory of Computing
, pp. 57-66
-
-
Bellare, M.1
Rogaway, P.2
|