-
2
-
-
0002805220
-
Undetectable on-line password guessing attacks
-
Ding Y, Horster P, Undetectable on-line password guessing attacks. ACM Operating Systems Review 1995; 29 (4): 77-86.
-
(1995)
ACM Operating Systems Review
, vol.29
, Issue.4
, pp. 77-86
-
-
Ding, Y.1
Horster, P.2
-
3
-
-
0008145442
-
Three-party encrypted key exchange: Attacks and a solution
-
Lin CL, Sun HM, Hwang T, Three-party encrypted key exchange: attacks and a solution. ACM Operating Systems Review 2000; 34 (4): 12-20.
-
(2000)
ACM Operating Systems Review
, vol.34
, Issue.4
, pp. 12-20
-
-
Lin, C.L.1
Sun, H.M.2
Hwang, T.3
-
4
-
-
0035701459
-
Three-party Encrypted Key Exchange without server public-keys
-
DOI 10.1109/4234.974498, PII S1089779801110720
-
Lin CL, Sun HM, Steiner M, Hwang T, Three-party encrypted key exchange without server's public keys. IEEE Communications Letters 2001; 5 (12): 497-499. (Pubitemid 34099691)
-
(2001)
IEEE Communications Letters
, vol.5
, Issue.12
, pp. 497-499
-
-
Lin, C.-L.1
Sun, H.-M.2
Steiner, M.3
Hwang, T.4
-
5
-
-
8344221264
-
Enhanced three-party encrypted key exchange without server's public keys
-
Lee TF, Hwang T, Lin CL, Enhanced three-party encrypted key exchange without server's public keys. Computers and Security 2004; 23 (7): 571-577.
-
(2004)
Computers and Security
, vol.23
, Issue.7
, pp. 571-577
-
-
Lee, T.F.1
Hwang, T.2
Lin, C.L.3
-
6
-
-
2342566530
-
A novel three-party encrypted key exchange protocol
-
Chang CC, Chang YF, A novel three-party encrypted key exchange protocol. Computer Standards and Interfaces 2004; 26 (5): 471-476.
-
(2004)
Computer Standards and Interfaces
, vol.26
, Issue.5
, pp. 471-476
-
-
Chang, C.C.1
Chang, Y.F.2
-
7
-
-
25144525619
-
Efficient verifier-based key agreement protocol for three parties without server's public key
-
Lee SW, Kim HS, Yoo KY, Efficient verifier-based key agreement protocol for three parties without server's public key. Applied Mathematics and Computation 2005; 167 (2): 996-1003.
-
(2005)
Applied Mathematics and Computation
, vol.167
, Issue.2
, pp. 996-1003
-
-
Lee, S.W.1
Kim, H.S.2
Yoo, K.Y.3
-
8
-
-
9544230689
-
Secure key agreement protocols for three-party against guessing attacks
-
Sun HM, Chen BC, Hwang T, Secure key agreement protocols for three-party against guessing attacks. Journal of Systems and Software 2005; 75 (1-2): 63-68.
-
(2005)
Journal of Systems and Software
, vol.75
, Issue.12
, pp. 63-68
-
-
Sun, H.M.1
Chen, B.C.2
Hwang, T.3
-
9
-
-
24144443144
-
Simple password-based encrypted key exchange protocols
-
Topics in Cryptology - CT-RSA 2005 - The Cryptographers' Track at the RSA Conference 2005
-
Abdalla M, Pointcheval D, Simple password-based encrypted key exchange protocols. Topics in Cryptology-CT-RSA 2005. Lecture Notes in Computer Science, vol. 3376. San Francisco, CA, USA, 14-18 February, 2005; 191-208. (Pubitemid 41231212)
-
(2005)
Lecture Notes in Computer Science
, vol.3376
, pp. 191-208
-
-
Abdalla, M.1
Pointcheval, D.2
-
11
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
Fairfax, VA, U.S.A.
-
Bellare M, Rogaway D, Random oracles are practical: a paradigm for designing efficient protocols. Proceedings of the First ACM Conference on Computer and Communications Security, Fairfax, VA, U.S.A., 1993; 62-73.
-
(1993)
Proceedings of the First ACM Conference on Computer and Communications Security
, pp. 62-73
-
-
Bellare, M.1
Rogaway, D.2
-
12
-
-
84873466407
-
Authenticated key exchange secure against dictionary attack
-
Springer: Berlin
-
Bellare M, Pointcheval D, Rogaway P, Authenticated key exchange secure against dictionary attack. Advances in Cryptology-Eurocrypt '00, vol. 1807. Springer: Berlin, 2000; 139-155.
-
(2000)
Advances in Cryptology-Eurocrypt '00
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
13
-
-
0001940580
-
Provably secure session key distribution: The three party case
-
Las Vegas, NV, U.S.A.
-
Bellare M, Rogaway D, Provably secure session key distribution: the three party case. Proceedings of the 27th Annual ACM Symposium on Theory of Computing, Las Vegas, NV, U.S.A., 1995; 57-66.
-
(1995)
Proceedings of the 27th Annual ACM Symposium on Theory of Computing
, pp. 57-66
-
-
Bellare, M.1
Rogaway, D.2
-
15
-
-
33846817471
-
Simple three-party key exchange protocol
-
DOI 10.1016/j.cose.2006.08.005, PII S0167404806001246
-
Lu R, Cao Z, Simple three-party key exchange protocol. Computers and Security 2007; 26 (1): 94-97. (Pubitemid 46216493)
-
(2007)
Computers and Security
, vol.26
, Issue.1
, pp. 94-97
-
-
Lu, R.1
Cao, Z.2
-
16
-
-
35448940560
-
Security enhancement for a three-party encrypted key exchange protocol against undetectable online password guessing attacks
-
Chen HB, Chen TH, Lee WB, Chang CC, Security enhancement for a three-party encrypted key exchange protocol against undetectable online password guessing attacks. Computer Standards and Interfaces 2008; 30 (1-2): 95-99.
-
(2008)
Computer Standards and Interfaces
, vol.30
, Issue.12
, pp. 95-99
-
-
Chen, H.B.1
Chen, T.H.2
Lee, W.B.3
Chang, C.C.4
-
17
-
-
42949161502
-
Improving the novel three-party encrypted key exchange protocol
-
Yoon EJ, Yoo KY, Improving the novel three-party encrypted key exchange protocol. Computer Standards and Interfaces 2008; 30 (5): 309-314.
-
(2008)
Computer Standards and Interfaces
, vol.30
, Issue.5
, pp. 309-314
-
-
Yoon, E.J.1
Yoo, K.Y.2
-
19
-
-
68049147074
-
A simple three-party password-based key exchange protocol
-
Huang HF, A simple three-party password-based key exchange protocol. International Journal of Communication Systems 2009; 22 (7): 857-862.
-
(2009)
International Journal of Communication Systems
, vol.22
, Issue.7
, pp. 857-862
-
-
Huang, H.F.1
-
20
-
-
79953304485
-
Cryptanalysis of a simple three-party password-based key exchange protocol
-
Yoon EJ, Yoo KY, Cryptanalysis of a simple three-party password-based key exchange protocol. International Journal of Communication Systems 2011; 24 (4): 532-542.
-
(2011)
International Journal of Communication Systems
, vol.24
, Issue.4
, pp. 532-542
-
-
Yoon, E.J.1
Yoo, K.Y.2
-
21
-
-
68849121226
-
Cryptanalysis of two three-party encrypted key exchange protocols
-
Lo NW, Yeh KH, Cryptanalysis of two three-party encrypted key exchange protocols. Computer Standards and Interfaces 2009; 31 (6): 1167-1174.
-
(2009)
Computer Standards and Interfaces
, vol.31
, Issue.6
, pp. 1167-1174
-
-
Lo, N.W.1
Yeh, K.H.2
-
22
-
-
76349117227
-
Simple password-based three-party authenticated key exchange without server public keys
-
Lee TF, Hwang T, Simple password-based three-party authenticated key exchange without server public keys. Information Sciences 2010; 180 (9): 1702-1714.
-
(2010)
Information Sciences
, vol.180
, Issue.9
, pp. 1702-1714
-
-
Lee, T.F.1
Hwang, T.2
|