-
1
-
-
0010254150
-
Authenticated key exchange secure against dictionary attack
-
M. Bellare, D. Pointcheval, P. Rogaway, "Authenticated key exchange secure against dictionary attack", in: Advances in Cryptology-EUROCRYPT'00, 2000, pp. 122-138.
-
(2000)
Advances in Cryptology-EUROCRYPT'00
, pp. 122-138
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
5
-
-
2342566530
-
A novel three-party encrypted key exchange protocol
-
C.C. Chang, and Y.F. Chang A novel three-party encrypted key exchange protocol Computer Standards & Interfaces 26 5 2004 471 476
-
(2004)
Computer Standards & Interfaces
, vol.26
, Issue.5
, pp. 471-476
-
-
Chang, C.C.1
Chang, Y.F.2
-
6
-
-
18444399366
-
Simple authenticated key agreement and protected password change protocol
-
T.Y. Chang, W.P. Yang, and M.S. Hwang Simple authenticated key agreement and protected password change protocol Computers & Mathematics with Applications 49 5-6 2005 703 714
-
(2005)
Computers & Mathematics with Applications
, vol.49
, Issue.56
, pp. 703-714
-
-
Chang, T.Y.1
Yang, W.P.2
Hwang, M.S.3
-
8
-
-
35448940560
-
Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks
-
H.B. Chen, T.H. Chen, W.B. Lee, and C.C. Chang Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks Computer Standards & Interfaces 30 1-2 2008 95 99
-
(2008)
Computer Standards & Interfaces
, vol.30
, Issue.12
, pp. 95-99
-
-
Chen, H.B.1
Chen, T.H.2
Lee, W.B.3
Chang, C.C.4
-
9
-
-
69649092978
-
Provably secure password-based three-party key exchange with optimal message steps
-
H.Y. Chien, and T.C. Wu Provably secure password-based three-party key exchange with optimal message steps Computer Journal 52 6 2009 646 655
-
(2009)
Computer Journal
, vol.52
, Issue.6
, pp. 646-655
-
-
Chien, H.Y.1
Wu, T.C.2
-
10
-
-
34948903343
-
Three weaknesses in a simple three-party key exchange protocol
-
H.R. Chung, and W.C. Ku Three weaknesses in a simple three-party key exchange protocol Information Sciences 178 1 2008 220 229
-
(2008)
Information Sciences
, vol.178
, Issue.1
, pp. 220-229
-
-
Chung, H.R.1
Ku, W.C.2
-
11
-
-
0002805220
-
Undetectable on-line password guessing attacks
-
Y. Ding, and P. Horster Undetectable on-line password guessing attacks ACM Operating Systems Review 29 3 1995 22 30
-
(1995)
ACM Operating Systems Review
, vol.29
, Issue.3
, pp. 22-30
-
-
Ding, Y.1
Horster, P.2
-
13
-
-
0027615231
-
Protecting poorly choosen secrets from guessing attacks
-
L. Gong, M. Lomas, R. Needham, and J. Saltzer Protecting poorly choosen secrets from guessing attacks IEEE Journal on Selected Areas in Communications 11 5 1993 648 656
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.5
, pp. 648-656
-
-
Gong, L.1
Lomas, M.2
Needham, R.3
Saltzer, J.4
-
14
-
-
0009733453
-
One round protocol for tripartite Diffie-Hellman
-
Incs 1838
-
A. Joux, One round protocol for tripartite Diffie-Hellman, in: Proc. of ANTS 4, Incs 1838, 2000.
-
(2000)
Proc. of ANTS
, vol.4
-
-
Joux, A.1
-
15
-
-
73149093942
-
Efficient user authentication and key agreement with user privacy protection
-
W.S. Juang, and J.L. Wu Efficient user authentication and key agreement with user privacy protection International Journal of Network Security 7 1 2008 120 129
-
(2008)
International Journal of Network Security
, vol.7
, Issue.1
, pp. 120-129
-
-
Juang, W.S.1
Wu, J.L.2
-
16
-
-
58049215501
-
Enhanced password-based simple three-party key exchange protocol
-
H.S. Kim, and J.Y. Choi Enhanced password-based simple three-party key exchange protocol Computers & Electrical Engineering 35 1 2009 107 114
-
(2009)
Computers & Electrical Engineering
, vol.35
, Issue.1
, pp. 107-114
-
-
Kim, H.S.1
Choi, J.Y.2
-
17
-
-
84875286190
-
An enhanced remote user authentication scheme with smart card
-
M. Kumar An enhanced remote user authentication scheme with smart card International Journal of Network Security 10 3 2010 175 184
-
(2010)
International Journal of Network Security
, vol.10
, Issue.3
, pp. 175-184
-
-
Kumar, M.1
-
18
-
-
77958081838
-
A new secure remote user authentication scheme with smart cards
-
M. Kumar A new secure remote user authentication scheme with smart cards International Journal of Network Security 11 3 2010 128 133
-
(2010)
International Journal of Network Security
, vol.11
, Issue.3
, pp. 128-133
-
-
Kumar, M.1
-
19
-
-
0033157651
-
An improvement of the password-based authentication protocol K1P on security against replay attacks
-
T. Kwon, M. Kang, S. Jung, and J. Song An improvement of the password-based authentication protocol K1P on security against replay attacks IEICE Transactions on Communications E82-B 7 1999 991 997
-
(1999)
IEICE Transactions on Communications
, vol.82
, Issue.7
, pp. 991-997
-
-
Kwon, T.1
Kang, M.2
Jung, S.3
Song, J.4
-
20
-
-
8344221264
-
A novel three-party encrypted key exchange protocol
-
T.F. Lee, T. Hwang, and C.L. Lin A novel three-party encrypted key exchange protocol Computers & Security 23 2004 571 577
-
(2004)
Computers & Security
, vol.23
, pp. 571-577
-
-
Lee, T.F.1
Hwang, T.2
Lin, C.L.3
-
21
-
-
67649791953
-
Communication-efficient three-party protocols for authentication and key agreement
-
T.F. Lee, J.L. Liu, M.J. Sung, S.B. Yang, and C.M. Chen Communication-efficient three-party protocols for authentication and key agreement Computers & Mathematics with Applications 58 4 2009 641 648
-
(2009)
Computers & Mathematics with Applications
, vol.58
, Issue.4
, pp. 641-648
-
-
Lee, T.F.1
Liu, J.L.2
Sung, M.J.3
Yang, S.B.4
Chen, C.M.5
-
22
-
-
0008145442
-
Three-party encrypted key exchange: Attacks and a solution
-
C.L. Lin, H.M. Sun, and T. Hwang Three-party encrypted key exchange: attacks and a solution ACM Operating Systems Review 34 4 2000 12 20
-
(2000)
ACM Operating Systems Review
, vol.34
, Issue.4
, pp. 12-20
-
-
Lin, C.L.1
Sun, H.M.2
Hwang, T.3
-
23
-
-
0035701459
-
Three-party encrypted key exchange without server public-keys
-
C.L. Lin, H.M. Sun, M. Steiner, and T. Hwang Three-party encrypted key exchange without server public-keys IEEE Communications Letters 5 12 2001 97 499
-
(2001)
IEEE Communications Letters
, vol.5
, Issue.12
, pp. 97-499
-
-
Lin, C.L.1
Sun, H.M.2
Steiner, M.3
Hwang, T.4
-
24
-
-
10444279176
-
Provably secure three-party password-authenticated key exchange
-
C.L. Lin, H.A. Wen, T. Hwang, and H.M. Sun Provably secure three-party password-authenticated key exchange IEICE Transaction on Fundamentals E87-A 11 2004 2990 3000
-
(2004)
IEICE Transaction on Fundamentals
, vol.87
, Issue.11
, pp. 2990-3000
-
-
Lin, C.L.1
Wen, H.A.2
Hwang, T.3
Sun, H.M.4
-
25
-
-
33846817471
-
Simple three-party key exchange protocol
-
R. Lu, and Z. Cao Simple three-party key exchange protocol Computers & Security 26 1 2007 94 97
-
(2007)
Computers & Security
, vol.26
, Issue.1
, pp. 94-97
-
-
Lu, R.1
Cao, Z.2
-
26
-
-
33845941453
-
Security weakness in a three-party pairing-based protocol for password authenticated key exchange
-
J. Nam, Y. Lee, S. Kim, and D. Won Security weakness in a three-party pairing-based protocol for password authenticated key exchange Information Sciences 177 6 2007 1364 1375
-
(2007)
Information Sciences
, vol.177
, Issue.6
, pp. 1364-1375
-
-
Nam, J.1
Lee, Y.2
Kim, S.3
Won, D.4
-
27
-
-
63649090970
-
An off-line dictionary attack on a simple three-party key exchange protocol
-
J. Nam, J. Paik, H.K. Kang, U.M. Kim, and D. Won An off-line dictionary attack on a simple three-party key exchange protocol IEEE Communications Letters 13 3 2009 05 207
-
(2009)
IEEE Communications Letters
, vol.13
, Issue.3
, pp. 05-207
-
-
Nam, J.1
Paik, J.2
Kang, H.K.3
Kim, U.M.4
Won, D.5
-
28
-
-
0033704170
-
Methods for protecting password transmission
-
M. Peyravian, and N. Zunic Methods for protecting password transmission Computers & Security 19 5 2000 466 469
-
(2000)
Computers & Security
, vol.19
, Issue.5
, pp. 466-469
-
-
Peyravian, M.1
Zunic, N.2
-
30
-
-
9544230689
-
Secure key agreement protocols for three-party against guessing attacks
-
H.M. Sun, B.C. Chen, and T. Hwang Secure key agreement protocols for three-party against guessing attacks The Journal of Systems and Software 75 1-2 2005 63 68
-
(2005)
The Journal of Systems and Software
, vol.75
, Issue.12
, pp. 63-68
-
-
Sun, H.M.1
Chen, B.C.2
Hwang, T.3
-
31
-
-
77958098545
-
Pass-Go: A proposal to improve the usability of graphical passwords
-
H. Tao, and C. Adams Pass-Go: a proposal to improve the usability of graphical passwords International Journal of Network Security 7 2 2008 273 292
-
(2008)
International Journal of Network Security
, vol.7
, Issue.2
, pp. 273-292
-
-
Tao, H.1
Adams, C.2
-
33
-
-
21644467750
-
Provably secure three-party password-based authenticated key exchange protocol using weil pairing
-
H.A. Wen, T.F. Lee, and T. Hwang Provably secure three-party password-based authenticated key exchange protocol using weil pairing IEE Proceedings-Communications 152 2 2005 138 143
-
(2005)
IEE Proceedings-Communications
, vol.152
, Issue.2
, pp. 138-143
-
-
Wen, H.A.1
Lee, T.F.2
Hwang, T.3
-
34
-
-
0742306164
-
Security of the improvement on the methods for protecting password transmission
-
C.C. Yang, T.Y. Chang, and M.S. Hwang Security of the improvement on the methods for protecting password transmission International Journal of Informatica 14 4 2003 551 558
-
(2003)
International Journal of Informatica
, vol.14
, Issue.4
, pp. 551-558
-
-
Yang, C.C.1
Chang, T.Y.2
Hwang, M.S.3
-
35
-
-
0142007845
-
Security enhancement for protecting password transmission
-
C.C. Yang, T.Y. Chang, J.W. Li, and M.S. Hwang Security enhancement for protecting password transmission IEICE Transactions on Communications E86-B 7 2003 2178 2181
-
(2003)
IEICE Transactions on Communications
, vol.86
, Issue.7
, pp. 2178-2181
-
-
Yang, C.C.1
Chang, T.Y.2
Li, J.W.3
Hwang, M.S.4
-
36
-
-
1842478681
-
Password-based user authentication and key distribution protocols for client-server applications
-
H.T. Yeh, and H.M. Sun Password-based user authentication and key distribution protocols for client-server applications The Journal of Systems and Software 72 1 2004 97 103
-
(2004)
The Journal of Systems and Software
, vol.72
, Issue.1
, pp. 97-103
-
-
Yeh, H.T.1
Sun, H.M.2
-
37
-
-
84875321481
-
An improvement on a three-party password-based key exchange protocol using weil pairing
-
Zeng Yong, Ma Jianfeng, and SangJae Moon An improvement on a three-party password-based key exchange protocol using weil pairing International Journal of Network Security 11 1 2010 17 22
-
(2010)
International Journal of Network Security
, vol.11
, Issue.1
, pp. 17-22
-
-
Yong, Z.1
Jianfeng, M.2
Moon, S.3
|