메뉴 건너뛰기




Volumn 39, Issue 3, 2010, Pages 220-226

Improved three party EKE protocol

Author keywords

Chang chang password key exchange protocol; PSRJ protocol; Undetectable online password guessing attack

Indexed keywords


EID: 77957204726     PISSN: 1392124X     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (4)

References (9)
  • 2
    • 0002805220 scopus 로고
    • Undetectable online password guessing attacks
    • Y. Ding, P. Horster. Undetectable Online password guessing attacks. ACM operating systems Review, Vol. 29, No. 4, pp 77-86 (1995)
    • (1995) ACM Operating Systems Review , vol.29 , Issue.4 , pp. 77-86
    • Ding, Y.1    Horster, P.2
  • 3
  • 4
    • 0002839106 scopus 로고
    • Refinement and extention of encrypted key exchange
    • M. Steiner, G. Tsudik, M. Waidner. Refinement and extention of encrypted key exchange. ACM Operating Systems Review, Vol. 29, No. 3, 1995, 22-30.
    • (1995) ACM Operating Systems Review , vol.29 , Issue.3 , pp. 22-30
    • Steiner, M.1    Tsudik, G.2    Waidner, M.3
  • 5
    • 0035701459 scopus 로고    scopus 로고
    • Three-party excrypted key exchange without server public-keys
    • C. L. Lin, H. M. Sun, M. Steiner, T. Hwang. Three-party excrypted key exchange without server public-Keys. IEEE Communication letters, Vol. 5, No. 12, 2001, 497-499.
    • (2001) IEEE Communication Letters , vol.5 , Issue.12 , pp. 497-499
    • Lin, C.L.1    Sun, H.M.2    Steiner, M.3    Hwang, T.4
  • 6
    • 2342566530 scopus 로고    scopus 로고
    • A novel three party encrypted key exchange protocol
    • C. C. Chang, Y. F. Chang. A novel three party encrypted key exchange protocol. Computer Standards and Interfaces, Vol. 26, No. 5, 2004, 471-476.
    • (2004) Computer Standards and Interfaces , vol.26 , Issue.5 , pp. 471-476
    • Chang, C.C.1    Chang, Y.F.2
  • 7
    • 42949161502 scopus 로고    scopus 로고
    • Improving the novel three-party encrypted key exchange protocol
    • E. J. Yoon, K. Y. Yoo. Improving the novel three-party encrypted key exchange protocol. Computer Standards and Interfaces, 30, 2008, 309-314.
    • (2008) Computer Standards and Interfaces , vol.30 , pp. 309-314
    • Yoon, E.J.1    Yoo, K.Y.2
  • 8
    • 68849121226 scopus 로고    scopus 로고
    • Cryptanalysis of two three-party encrypted key exchange protocols
    • Nov
    • N. W. Lo, K.-H. Yeh. Cryptanalysis of two three-party encrypted key exchange protocols. Computer Standards & Interfaces, Vol. 31, issue 6, Nov. 2009, 1167-1174.
    • (2009) Computer Standards & Interfaces , vol.31 , Issue.6 , pp. 1167-1174
    • Lo, N.W.1    Yeh, K.-H.2
  • 9
    • 77949279707 scopus 로고    scopus 로고
    • Improved analysis of chang and chang password key exchange protocol
    • Doi 10.1109/ACT
    • R. Padmavathy, S. Tallapally, R. Jayadev Gyani. Improved Analysis of Chang and Chang password key exchange protocol, ACT 2009, 781-783, Doi 10.1109/ACT. 2009. 197.
    • (2009) ACT 2009 , vol.197 , pp. 781-783
    • Padmavathy, R.1    Tallapally, S.2    Jayadev Gyani, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.