-
1
-
-
0026850091
-
Encrypted key exchange: Password-based protocols secure against dictionary attacks
-
Bellovin SM, Merritt M,. Encrypted key exchange: password-based protocols secure against dictionary attacks. Proceedings of 1992 EEE Symposium on Research in Security and Privacy. Lecture Notes in Computer Science. Springer: Berlin, 1992; 72-84. (Pubitemid 23569189)
-
(1992)
Proceedings of the Symposium on Security and Privacy
, pp. 72-84
-
-
Bellovin Steven, M.1
Merritt Michael2
-
2
-
-
0008145442
-
Three-party encrypted key exchange: Attacks and a solution
-
Lin CL, Sun HM, Hwang T,. Three-party encrypted key exchange: attacks and a solution. ACM Operating Systems Review 2000; 34: 12-20.
-
(2000)
ACM Operating Systems Review
, vol.34
, pp. 12-20
-
-
Lin, C.L.1
Sun, H.M.2
Hwang, T.3
-
3
-
-
2342566530
-
A novel three-party encrypted key exchange protocol
-
Chang CC, Chang YF,. A novel three-party encrypted key exchange protocol. Computer Standards and Interfaces 2004; 26 (5): 472-476.
-
(2004)
Computer Standards and Interfaces
, vol.26
, Issue.5
, pp. 472-476
-
-
Chang, C.C.1
Chang, Y.F.2
-
4
-
-
8344221264
-
Enhanced three-party encrypted key exchange without server public keys
-
Lee TF, Hwang T, Lin CL,. Enhanced three-party encrypted key exchange without server public keys. Computer and Security 2004; 23 (7): 571-577.
-
(2004)
Computer and Security
, vol.23
, Issue.7
, pp. 571-577
-
-
Lee, T.F.1
Hwang, T.2
Lin, C.L.3
-
5
-
-
25144525619
-
Efficient verifier-based key agreement protocol for three parties without server's public key
-
Lee SW, Kim HS, Yoo KY,. Efficient verifier-based key agreement protocol for three parties without server's public key. Applied Mathematics and Computation 2005; 167 (2): 996-1003.
-
(2005)
Applied Mathematics and Computation
, vol.167
, Issue.2
, pp. 996-1003
-
-
Lee, S.W.1
Kim, H.S.2
Yoo, K.Y.3
-
6
-
-
9544230689
-
Secure key agreement protocols for three-party against guessing attacks
-
Sun HM, Chen BC, Hwang T,. Secure key agreement protocols for three-party against guessing attacks. Journal of Systems and Software 2005; 75: 63-68.
-
(2005)
Journal of Systems and Software
, vol.75
, pp. 63-68
-
-
Sun, H.M.1
Chen, B.C.2
Hwang, T.3
-
7
-
-
33846817471
-
Simple three-party key exchange protocol
-
Lu RX, Cao ZF,. Simple three-party key exchange protocol. Computers and Security 2007; 26: 94-97.
-
(2007)
Computers and Security
, vol.26
, pp. 94-97
-
-
Lu, R.X.1
Cao, Z.F.2
-
8
-
-
42949161502
-
Improving the novel three-party encrypted key exchange protocol
-
Yoon EJ, Yoo KY,. Improving the novel three-party encrypted key exchange protocol. Computer Standards and Interfaces 2008; 30 (5): 309-314.
-
(2008)
Computer Standards and Interfaces
, vol.30
, Issue.5
, pp. 309-314
-
-
Yoon, E.J.1
Yoo, K.Y.2
-
9
-
-
42649086478
-
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
-
Phan RCW, Yau WC, Goi BM,. Cryptanalysis of simple three-party key exchange protocol (S-3PAKE). Information Sciences 2008; 178: 2849-2856.
-
(2008)
Information Sciences
, vol.178
, pp. 2849-2856
-
-
Phan, R.C.W.1
Yau, W.C.2
Goi, B.M.3
-
10
-
-
44849118543
-
Cryptanalysis of simple three-party key exchange protocol
-
Guo H, Li Z, Mu Y, Zhang X,. Cryptanalysis of simple three-party key exchange protocol. Computers and Security 2008; 27: 16-21.
-
(2008)
Computers and Security
, vol.27
, pp. 16-21
-
-
Guo, H.1
Li, Z.2
Mu, Y.3
Zhang, X.4
-
11
-
-
58049215501
-
Enhanced password-based simple three-party key exchange protocol
-
Kim HS, Choi JY,. Enhanced password-based simple three-party key exchange protocol. Computers and Electrical Engineering 2009; 35: 107-114.
-
(2009)
Computers and Electrical Engineering
, vol.35
, pp. 107-114
-
-
Kim, H.S.1
Choi, J.Y.2
-
12
-
-
68049147074
-
A simple three-party password-based key exchange protocol
-
Huang HF,. A simple three-party password-based key exchange protocol. International Journal of Communication Systems 2009; 22: 857-862.
-
(2009)
International Journal of Communication Systems
, vol.22
, pp. 857-862
-
-
Huang, H.F.1
-
13
-
-
68949161753
-
An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments
-
Yang JH, Chang CC,. An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments. Journal of Systems and Software 2009; 82 (9): 1497-1502.
-
(2009)
Journal of Systems and Software
, vol.82
, Issue.9
, pp. 1497-1502
-
-
Yang, J.H.1
Chang, C.C.2
-
14
-
-
0002805220
-
Undetectable on-line password guessing attacks
-
Ding Y, Horster P,. Undetectable on-line password guessing attacks. ACM Operating Systems Review 1995; 29 (4): 77-86.
-
(1995)
ACM Operating Systems Review
, vol.29
, Issue.4
, pp. 77-86
-
-
Ding, Y.1
Horster, P.2
-
15
-
-
1542593353
-
Authentication and authenticated key exchanges
-
Diffie W, van Oorschot PC, Wiener MJ,. Authentication and authenticated key exchanges. Design, Codes and Cryptography 1992; 2 (2): 107-125.
-
(1992)
Design, Codes and Cryptography
, vol.2
, Issue.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.C.2
Wiener, M.J.3
-
16
-
-
33646805409
-
Examining indistinguishability-based proof models for key establishment protocols
-
DOI 10.1007/11593447-32, Advances in Cryptology - ASIACRYPT 2005 - 11th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
-
Choo KKR, Boyd C, Hitchcock Y,. Examining indistinguishability-based proof models for key establishment protocols. Advances in Cryptology- Asiacrypt'05. Lecture Notes in Computer Science, vol. 3788. Springer: Berlin, 2005; 585-604. (Pubitemid 43763497)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3788
, pp. 585-604
-
-
Choo, K.-K.R.1
Boyd, C.2
Hitchcock, Y.3
|