-
1
-
-
0026850091
-
Encrypted key exchange: Password-based protocols secure against dictionary attacks
-
Oakland, California, May
-
S. M. Bellovin, and M. Merrit, "Encrypted key exchange: password-based protocols secure against dictionary attacks", IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, California, May, pp. 72-84, 1992.
-
(1992)
IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 72-84
-
-
Bellovin, S.M.1
Merrit, M.2
-
2
-
-
35448940560
-
Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks
-
H. B. Chen, T. H. Chen, W. B. Lee, and C. C. Chang, "Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks", Computer Standards & Interfaces, vol. 30, no. 1-2, pp. 95-99, 2008.
-
(2008)
Computer Standards & Interfaces
, vol.30
, Issue.1-2
, pp. 95-99
-
-
Chen, H.B.1
Chen, T.H.2
Lee, W.B.3
Chang, C.C.4
-
3
-
-
2342566530
-
A novel three-party encrypted key exchange protocol
-
C. C. Chang, and Y. F. Chang, "A novel three-party encrypted key exchange protocol", Computer Standards & Interfaces, vol. 26, no. 5, pp. 471-476, 2004.
-
(2004)
Computer Standards & Interfaces
, vol.26
, Issue.5
, pp. 471-476
-
-
Chang, C.C.1
Chang, Y.F.2
-
4
-
-
0002805220
-
Undetectable on-line password guessing attacks
-
Y. Ding, and P. Horster, "Undetectable on-line password guessing attacks", ACM SIGOPS Operating Systems Review, vol. 29, no. 4, pp. 77-86, 1995.
-
(1995)
ACM SIGOPS Operating Systems Review
, vol.29
, Issue.4
, pp. 77-86
-
-
Ding, Y.1
Horster, P.2
-
5
-
-
74049134548
-
A hard-core predicate for all one-way functions
-
Seattle Washington, May
-
O. Goldreich, and L. Levin, "A hard-core predicate for all one-way functions", Proceedings of the 21st ACM Symposium on the Theory of Computing, Seattle Washington, pp. 44-61, May, 1989.
-
(1989)
Proceedings of the 21st ACM Symposium on the Theory of Computing
, pp. 44-61
-
-
Goldreich, O.1
Levin, L.2
-
6
-
-
0008145442
-
Three-party encrypted key exchange: Attacks and a solution
-
C. L. Lin, H. M. Sun, and T. Hwang, "Three-party encrypted key exchange: attacks and a solution", ACM SIGOPS Operating Systems Review, vol. 34, no. 4, pp. 12-20, 2000.
-
(2000)
ACM SIGOPS Operating Systems Review
, vol.34
, Issue.4
, pp. 12-20
-
-
Lin, C.L.1
Sun, H.M.2
Hwang, T.3
-
7
-
-
0035701459
-
Three-party encrypted key exchange without server public-keys
-
C. L. Lin, H. M. Sun, M. Steniner, and T. Hwang, "Three-party encrypted key exchange without server public-keys", IEEE Communications Letters, vol. 5, no. 12, pp. 497-499, 2001.
-
(2001)
IEEE Communications Letters
, vol.5
, Issue.12
, pp. 497-499
-
-
Lin, C.L.1
Sun, H.M.2
Steniner, M.3
Hwang, T.4
-
8
-
-
34548135536
-
Off-line password guessing attack on an efficient key agreement protocol for secure authentication
-
R. Lu and Z. Cao, "Off-line password guessing attack on an efficient key agreement protocol for secure authentication", International Journal of Network Security, vol. 3, no. 1, pp. 35-38, 2006.
-
(2006)
International Journal of Network Security
, vol.3
, Issue.1
, pp. 35-38
-
-
Lu, R.1
Cao, Z.2
-
9
-
-
9544230689
-
Secure key agreement protocols for threeparty against guessing attacks
-
H. M. Sun, B. C. Chen, and T. Hwang, "Secure key agreement protocols for threeparty against guessing attacks", The Journal of Systems and Software, vol. 75, no. 1-2, pp. 63-68, 2005.
-
(2005)
The Journal of Systems and Software
, vol.75
, Issue.1-2
, pp. 63-68
-
-
Sun, H.M.1
Chen, B.C.2
Hwang, T.3
-
10
-
-
0002839106
-
Refinement and extension of encrypted key exchange
-
M. Steiner, G. Tsudik, and M. Waidner, "Refinement and extension of encrypted key exchange", ACM SIGOPS Operating Systems Review, vol. 29, no. 3, pp. 22-30, 1995.
-
(1995)
ACM SIGOPS Operating Systems Review
, vol.29
, Issue.3
, pp. 22-30
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
11
-
-
40949152760
-
Password authentication schemes: Current status and key issues
-
Sept
-
C. S. Tsai, C. C. Lee, and M. S. Hwang, "Password Authentication Schemes: Current Status and Key Issues", International Journal of Network Security, vol. 3, no. 2, pp. 101-115, Sept. 2006.
-
(2006)
International Journal of Network Security
, vol.3
, Issue.2
, pp. 101-115
-
-
Tsai, C.S.1
Lee, C.C.2
Hwang, M.S.3
-
12
-
-
42949161502
-
Improving the novel three-party encrypted key exchange protocol
-
E. J. Yoon, and K. Y. Yoo, "Improving the novel three-party encrypted key exchange protocol", Computer Standards & Interfaces, vol. 30, no. 5, pp. 309-314, 2008.
-
(2008)
Computer Standards & Interfaces
, vol.30
, Issue.5
, pp. 309-314
-
-
Yoon, E.J.1
Yoo, K.Y.2
-
13
-
-
84944878354
-
-
CRC Press, Boca Raton
-
A. J. Menezes, P. C. van Oorschot, S. A. Vanstone, "Handbook of Applied Cryptography", CRC Press, Boca Raton, 1997.
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
|