-
2
-
-
2342566530
-
A novel three-party encrypted key exchange protocol
-
C. C. Chang and Y. F. Chang, A novel three-party encrypted key exchange protocol, Computer Standards and Interfaces, vol.26, no.5, pp.471-476, 2004.
-
(2004)
Computer Standards and Interfaces
, vol.26
, Issue.5
, pp. 471-476
-
-
Chang, C.C.1
Chang, Y.F.2
-
3
-
-
47549109760
-
A round- and computation- efficient three-party authenti-cated key exchange protocol
-
T. H. Chen, W. B. Lee and H. B. Chen, A round- and computation- efficient three-party authenti-cated key exchange protocol, Journal of Systems and Software, vol.81, no.9, pp.1581-1590, 2008.
-
(2008)
Journal of Systems and Software
, vol.81
, Issue.9
, pp. 1581-1590
-
-
Chen, T.H.1
Lee, W.B.2
Chen, H.B.3
-
4
-
-
34948903343
-
Three weaknesses in a simple three-party key exchange protocol
-
H. R. Chung and W. C. Ku, Three weaknesses in a simple three-party key exchange protocol, Information Science, vol.178, no.1, pp.220-229, 2008.
-
(2008)
Information Science
, vol.178
, Issue.1
, pp. 220-229
-
-
Chung, H.R.1
Ku, W.C.2
-
5
-
-
0002805220
-
Undetectable on-line password guessing attacks
-
Y. Ding and P. Horster, Undetectable on-line password guessing attacks, ACM Operating Systems Review, vol.29, no.4, pp.77-86, 1995.
-
(1995)
ACM Operating Systems Review
, vol.29
, Issue.4
, pp. 77-86
-
-
Ding, Y.1
Horster, P.2
-
6
-
-
44849118543
-
Cryptanalysis of simple three-party key exchange protocol
-
H. Guo, Z. Li, Y. Mu and X. Zhang, Cryptanalysis of simple three-party key exchange protocol, Computers and Security, vol.27, no.1-2, pp.16-21, 2008.
-
(2008)
Computers and Security
, vol.27
, Issue.1-2
, pp. 16-21
-
-
Guo, H.1
Li, Z.2
Mu, Y.3
Zhang, X.4
-
7
-
-
74549221711
-
An efficient protocol for authenticated key agreement, Designs
-
L. Law, A. Menezes, M. Qu, J. Solinas and S. Vanstone, An efficient protocol for authenticated key agreement, Designs, Codes and Cryptography, vol.28, no.2, pp.119-134, 2003.
-
(2003)
Codes and Cryptography
, vol.28
, Issue.2
, pp. 119-134
-
-
Law, L.1
Menezes, A.2
Qu, M.3
Solinas, J.4
Vanstone, S.5
-
8
-
-
8344221264
-
Enhanced three-party encrypted key exchange without server public keys
-
T. F. Lee, T. Hwang and C. L. Lin, Enhanced three-party encrypted key exchange without server public keys, Computers and Security, vol.23, no.7, pp.571-577, 2004.
-
(2004)
Computers and Security
, vol.23
, Issue.7
, pp. 571-577
-
-
Lee, T.F.1
Hwang, T.2
Lin, C.L.3
-
9
-
-
25144525619
-
Efficient verifier-based key agreement protocol for three parties without server's public key
-
S. W. Lee, H. S. Kim and K. Y. Yoo. Efficient verifier-based key agreement protocol for three parties without server's public key, Applied Mathematics and Computation, vol.167, no.2, pp.996-1003, 2005.
-
(2005)
Applied Mathematics and Computation
, vol.167
, Issue.2
, pp. 996-1003
-
-
Lee, S.W.1
Kim, H.S.2
Yoo, K.Y.3
-
10
-
-
0008145442
-
Three party-encrypted key exchange: Attacks and a solution
-
C. L. Lin, H. M. Sun and T. Hwang, Three party-encrypted key exchange: attacks and a solution, ACM Operating Systems Review, vol.34, no.4, pp.12-20, 2000.
-
(2000)
ACM Operating Systems Review
, vol.34
, Issue.4
, pp. 12-20
-
-
Lin, C.L.1
Sun, H.M.2
Hwang, T.3
-
11
-
-
0035701459
-
Three-party encrypted key exchange without server pub-lic-keys
-
C. L. Lin, H. M. Sun, M. Steiner and T. Hwang, Three-party encrypted key exchange without server pub-lic-keys, IEEE Communication Letters, vol.5, no.12, pp.497-499, 2001.
-
(2001)
IEEE Communication Letters
, vol.5
, Issue.12
, pp. 497-499
-
-
Lin, C.L.1
Sun, H.M.2
Steiner, M.3
Hwang, T.4
-
12
-
-
33846817471
-
Simple three-party key exchange protocol
-
R. X. Lu and Z. F. Cao, Simple three-party key exchange protocol, Computers and Security, vol.26, no.1, pp.94-97, 2007.
-
(2007)
Computers and Security
, vol.26
, Issue.1
, pp. 94-97
-
-
Lu, R.X.1
Cao, Z.F.2
-
13
-
-
33845941453
-
Security weakness in a three-party pairing-based protocol for password authenticated key exchange
-
J. Nam, Y. Lee, S. Kim and D. Won, Security weakness in a three-party pairing-based protocol for password authenticated key exchange, Information Sciences, vol.177, no.6, pp.1364-1375, 2007.
-
(2007)
Information Sciences
, vol.177
, Issue.6
, pp. 1364-1375
-
-
Nam, J.1
Lee, Y.2
Kim, S.3
Won, D.4
-
14
-
-
42649086478
-
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
-
C. W. Phan Raphael and W. C. Yau and B. M. Goi, Cryptanalysis of simple three-party key exchange protocol (S-3PAKE), Information Science, vol.178, no.13, pp.2849-2856, 2008.
-
(2008)
Information Science
, vol.178
, Issue.13
, pp. 2849-2856
-
-
Phan, R.C.W.1
Yau, W.C.2
Goi, B.M.3
-
15
-
-
0002839106
-
Refinement and extension of encrypted key exchange
-
M. Steiner, G. Tsudik and M. Waidner, Refinement and extension of encrypted key exchange, ACM Operating Systems Review, vol.29, no.3, pp.22-30, 1995.
-
(1995)
ACM Operating Systems Review
, vol.29
, Issue.3
, pp. 22-30
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
16
-
-
9544230689
-
Secure key agreement protocols for three-party against guessing attacks
-
H. M. Sun, B. C. Chen and T. Hwang, Secure key agreement protocols for three-party against guessing attacks, Journal of Systems and Software, vol.75, no.1-2, pp.63-68, 2005.
-
(2005)
Journal of Systems and Software
, vol.75
, Issue.1-2
, pp. 63-68
-
-
Sun, H.M.1
Chen, B.C.2
Hwang, T.3
-
17
-
-
21644467750
-
Provably Secure Three-party Password-based Authenticated Key Exchange Protocol Using Weil Pairing
-
H. A. Wen, T. F. Lee and T. Hwang, Provably secure three-party password-based authenticated key exchange protocol using Weil pairing, IEE Proceedings-Communications, vol.152, no.2, pp.138-143, 2005.
-
(2005)
IEE Proceedings-Communications
, vol.152
, Issue.2
, pp. 138-143
-
-
Wen, H.A.1
Lee, T.F.2
Hwang, T.3
-
19
-
-
48249099653
-
A practical three-party key exchange protocol with round efficiency
-
Y. F. Chang, A practical three-party key exchange protocol with round efficiency, International Journal of Innovative Computing, Information and Control, vol.4, no.4, pp.953-960, 2008.
-
(2008)
International Journal of Innovative Computing, Information and Control
, vol.4
, Issue.4
, pp. 953-960
-
-
Chang, Y.F.1
-
20
-
-
48249121784
-
Collision detection and estimation of its spot for a flexible beam using ratio of mode functions
-
Y. Sawada, and T. Sako, Collision detection and estimation of its spot for a flexible beam using ratio of mode functions, International Journal of Innovative Computing, Information and Control, vol.2, no.5, pp.1027-1038, 2005.
-
(2005)
International Journal of Innovative Computing, Information and Control
, vol.2
, Issue.5
, pp. 1027-1038
-
-
Sawada, Y.1
Sako, T.2
-
21
-
-
61749094001
-
Fuzzy control of active queue management routers for transmission con-trol protocol networks via time-delay affine Takagi-Sugeno fuzzy models
-
H. Chu, K. Tsai and W. Chang, Fuzzy control of active queue management routers for transmission con-trol protocol networks via time-delay affine Takagi-Sugeno fuzzy models, International Journal of Innovative Computing, Information and Control, vol.4, no.2, pp.291-312, 2008.
-
(2008)
International Journal of Innovative Computing, Information and Control
, vol.4
, Issue.2
, pp. 291-312
-
-
Chu, H.1
Tsai, K.2
Chang, W.3
-
22
-
-
63549093774
-
A new efficient and complete remote user authentication protocol with smart card
-
H. F. Huang and W. C. Wei, A new efficient and complete remote user authentication protocol with smart card, International Journal of Innovative Computing, Information and Control, vol.4, no.11, pp.2803-2808, 2008.
-
(2008)
International Journal of Innovative Computing, Information and Control
, vol.4
, Issue.11
, pp. 2803-2808
-
-
Huang, H.F.1
Wei, W.C.2
-
23
-
-
48249127045
-
Analysis of the robustness of the pressure-based individual identification system based on neural networks
-
L. Mi and F. Takeda, Analysis of the robustness of the pressure-based individual identification system based on neural networks, International Journal of Innovative Computing, Information and Control, vol.3, no.1, pp.97-110, 2007.
-
(2007)
International Journal of Innovative Computing, Information and Control
, vol.3
, Issue.1
, pp. 97-110
-
-
Mi, L.1
Takeda, F.2
-
24
-
-
48249149342
-
Security analysis of session initiation protocol
-
Z. Zhang, B. Fang, M. Hu and H. Zhang, Security analysis of session initiation protocol, International Journal of Innovative Computing, Information and Control, vol.3, no.2, pp.457-469, 2007.
-
(2007)
International Journal of Innovative Computing, Information and Control
, vol.3
, Issue.2
, pp. 457-469
-
-
Zhang, Z.1
Fang, B.2
Hu, M.3
Zhang, H.4
-
25
-
-
63549129912
-
Secure authentication protocols for mobile commerce transactions
-
J. S. Lee, Y. F. Chang and C. C. Chang, Secure authentication protocols for mobile commerce transactions, International Journal of Innovative Computing, Information and Control, vol.4, no.9, pp.2305-2314, 2008.
-
(2008)
International Journal of Innovative Computing, Information and Control
, vol.4
, Issue.9
, pp. 2305-2314
-
-
Lee, J.S.1
Chang, Y.F.2
Chang, C.C.3
-
26
-
-
48249095888
-
A novel authentication protocol for multi-server architecture without smart cards
-
J. S. Lee, Y. F. Chang and C. C. Chang, A novel authentication protocol for multi-server architecture without smart cards, International Journal of Innovative Computing, Information and Control, vol.4, no.6, pp.1357-1364, 2008.
-
(2008)
International Journal of Innovative Computing, Information and Control
, vol.4
, Issue.6
, pp. 1357-1364
-
-
Lee, J.S.1
Chang, Y.F.2
Chang, C.C.3
-
27
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
B. C. Neuman and T. Ts'o', Kerberos: An authentication service for computer networks, IEEE Communications Magazine, vol.32, no.9, pp.33-38, 1994.
-
(1994)
IEEE Communications Magazine
, vol.32
, Issue.9
, pp. 33-38
-
-
Neuman, B.C.1
Ts'o', T.2
-
28
-
-
80052537820
-
-
Proc. of the 1992 European Symposium on Research in Computer Security - ESORICS, Toulouse, France
-
R. Molva, G. Tsudik, E. van Herreweghen and S. Zatti, KryptoKnight authentication and key distribu-tion system, Proc. of the 1992 European Symposium on Research in Computer Security - ESORICS, Toulouse, France, pp.1-16, 1992.
-
(1992)
KryptoKnight Authentication and Key Distribu-tion System
, pp. 1-16
-
-
Molva, R.1
Tsudik, G.2
van Herreweghen, E.3
Zatti, S.4
|