-
1
-
-
2342566530
-
A Novel Three-party Encrypted Key Exchange Protocol
-
Chang, C. C., Chang, Y. F.: A Novel Three-party Encrypted Key Exchange Protocol. Computer Standards & Interfaces, vol. 26, (2004), pp. 471-476
-
(2004)
Computer Standards & Interfaces
, vol.26
, pp. 471-476
-
-
Chang, C.C.1
Chang, Y.F.2
-
2
-
-
7544250474
-
Password Authentication without the Server Public Key
-
Chang, Y. F., Chang, C. C., Liu, Y. L.: Password Authentication without the Server Public Key. IEICE Transactions on Communications, vol. E87-B, no. 10, (2004), pp. 3088-3091
-
(2004)
IEICE Transactions on Communications
, vol.E87-B
, Issue.10
, pp. 3088-3091
-
-
Chang, Y.F.1
Chang, C.C.2
Liu, Y.L.3
-
3
-
-
0026850091
-
Encrypted Key Exchange: Password-based Protocols Secure against Dictionary Attacks
-
Bellovin, S. M., Merrit, M.: Encrypted Key Exchange: Password-based Protocols Secure against Dictionary Attacks. Proceedings of 1992 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, California, (1992), pp. 72-84
-
(1992)
Proceedings of 1992 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, California
, pp. 72-84
-
-
Bellovin, S.M.1
Merrit, M.2
-
4
-
-
4043095653
-
Efficient Three-party Key Exchange using Smart Cards
-
Jaung, W. J.: Efficient Three-party Key Exchange using Smart Cards. IEEE Transactions on Consumer Electronics, vol. 50, no. 2, (2004), pp. 619-624
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.2
, pp. 619-624
-
-
Jaung, W.J.1
-
5
-
-
0008145442
-
Three-party Encrypted Key Exchange: Attacks and a Solution
-
Lin, C. L., Sun, H. M., Hwang, T.: Three-party Encrypted Key Exchange: Attacks and a Solution. ACM Operating Systems Review, vol. 34, no. 4, (2000), pp. 12-20
-
(2000)
ACM Operating Systems Review
, vol.34
, Issue.4
, pp. 12-20
-
-
Lin, C.L.1
Sun, H.M.2
Hwang, T.3
-
6
-
-
0035701459
-
Three-party Encrypted Key Exchange without Server Public Keys
-
Lin, C. L., Sun, H. M., Steiner, M., Hwang, T.: Three-party Encrypted Key Exchange without Server Public Keys. IEEE Communications Letters, vol. 5, (2001), pp. 497-499
-
(2001)
IEEE Communications Letters
, vol.5
, pp. 497-499
-
-
Lin, C.L.1
Sun, H.M.2
Steiner, M.3
Hwang, T.4
-
7
-
-
8344221264
-
Enhanced Three-party Encrypted Key Exchange without Server Public Key
-
Lee, T. F., Hwang, T., Lin, C. L.: Enhanced Three-party Encrypted Key Exchange without Server Public Key. Computer & Security, vol. 23, (2004), pp. 571-577
-
(2004)
Computer & Security
, vol.23
, pp. 571-577
-
-
Lee, T.F.1
Hwang, T.2
Lin, C.L.3
-
8
-
-
33846817471
-
Simple Three-party Key Exchange Protocol
-
Lu, R., Cao, Z.: Simple Three-party Key Exchange Protocol. Computer & Security, vol. 26, (2007), pp. 94-97
-
(2007)
Computer & Security
, vol.26
, pp. 94-97
-
-
Lu, R.1
Cao, Z.2
-
10
-
-
9544230689
-
Secure Key Agreement Protocols for Three-party against Guessing Attacks
-
Sun, H. M., Chen B. C., Hwang, T.: Secure Key Agreement Protocols for Three-party against Guessing Attacks. The Journal of System and Software, vol. 75, (2005), pp. 63-68
-
(2005)
The Journal of System and Software
, vol.75
, pp. 63-68
-
-
Sun, H.M.1
Chen, B.C.2
Hwang, T.3
-
11
-
-
0003851399
-
-
John Wiley and Sons Inc., 2nd Edition, New York, U.S.A.
-
Schneier, B.: Applied Cryptography, Protocols, Algorithms, and Source Code in C, John Wiley and Sons Inc., 2nd Edition, New York, U.S.A., pp. 15 (1996)
-
(1996)
Applied Cryptography, Protocols, Algorithms, and Source Code in C
, pp. 15
-
-
Schneier, B.1
-
12
-
-
0002839106
-
Refinement and Extension of Encrypted Key Exchange
-
Steiner, M., Tsudik, G., Waidner, M.: Refinement and Extension of Encrypted Key Exchange. ACM Operating Systems Review, vol. 29, no. 3, (1995), pp. 22-30
-
(1995)
ACM Operating Systems Review
, vol.29
, Issue.3
, pp. 22-30
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
|