-
1
-
-
35248831179
-
CAPTCHA: using hard AI problems for security
-
Springer-Verlag, LNCS 2656
-
L. V. Ahn, M. Blum, N. J. Hopper, and J. Langford, "CAPTCHA: using hard AI problems for security," Advances in Cryptology-Eurocrypt' 03, LNCS 2656, pp. 294-311, Springer-Verlag, 2003.
-
(2003)
Advances in Cryptology-Eurocrypt' 03
, pp. 294-311
-
-
Ahn, L.V.1
Blum, M.2
Hopper, N.J.3
Langford, J.4
-
3
-
-
0037623983
-
Identity-based encryption from the Weil pairing
-
D. Boneh, and M. Franklin, "Identity-based encryption from the Weil pairing," SIAM Journal on Computing, vol. 32, no. 3, pp. 586-615, 2003.
-
(2003)
SIAM Journal on Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
4
-
-
84944063128
-
Password-authenticated key exchange between clients with different passwords
-
(ICICS 2002), LNCS 2513, Springer Verlag
-
J. W. Byun, I.R. Jeong, D. H. Lee, and C. S. Park, "Password-authenticated key exchange between clients with different passwords," The Fourth International Conference on Information and Communication Security (ICICS 2002), LNCS 2513, pp. 134-146, Springer Verlag, 2002.
-
(2002)
The Fourth International Conference on Information and Communication Security
, pp. 134-146
-
-
Byun, J.W.1
Jeong, I.R.2
Lee, D.H.3
Park, C.S.4
-
6
-
-
84976665942
-
Timestamps in key distribution protocols
-
D. Denning, G. Sacco, "Timestamps in key distribution protocols," Communications of the ACM, vol. 24, no. 8, pp. 533-536, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.8
, pp. 533-536
-
-
Denning, D.1
Sacco, G.2
-
7
-
-
38049019277
-
Password-based encrypted group key agreement
-
R. Dutta and R. Barua, "Password-based encrypted group key agreement," International Journal of Network Security, vol. 3, no. 1, pp. 23-34, 2006.
-
(2006)
International Journal of Network Security
, vol.3
, Issue.1
, pp. 23-34
-
-
Dutta, R.1
Barua, R.2
-
8
-
-
0027615231
-
Protecting poorly chosen secrets from guessing attacks
-
L. Gong, M. Lomas, R. Needham, and J. Saltzer, "Protecting poorly chosen secrets from guessing attacks," Journal on Selected Areas in Communications, vol. 11, no. 5, pp. 648-656, 1993.
-
(1993)
Journal on Selected Areas in Communications
, vol.11
, Issue.5
, pp. 648-656
-
-
Gong, L.1
Lomas, M.2
Needham, R.3
Saltzer, J.4
-
9
-
-
33646261491
-
Authenticated encryption schemes: Current status and key issues
-
M. S. Hwang and C. Y. Liu, "Authenticated encryption schemes: Current status and key issues," International Journal of Network Security, vol. 1, no. 2, pp. 61-73, 2005.
-
(2005)
International Journal of Network Security
, vol.1
, Issue.2
, pp. 61-73
-
-
Hwang, M.S.1
Liu, C.Y.2
-
10
-
-
15244362289
-
Password-only authenticated key establishment protocol without public key cryptography
-
C. S. Laih, L. Ding, and Y. M. Huang, "Password-only authenticated key establishment protocol without public key cryptography," Electronics Letters, vol. 41, no. 4, pp. 185-186, 2005.
-
(2005)
Electronics Letters
, vol.41
, Issue.4
, pp. 185-186
-
-
Laih, C.S.1
Ding, L.2
Huang, Y.M.3
-
11
-
-
0024940229
-
Reducing risks from poorly chosen keys
-
T. Lomas, L. Gong, J. Saltzer, and R. Needham. "Reducing risks from poorly chosen keys," ACM SIGOPS Operating System Review, vol. 23, no. 5, pp. 14-18, 1989.
-
(1989)
ACM SIGOPS Operating System Review
, vol.23
, Issue.5
, pp. 14-18
-
-
Lomas, T.1
Gong, L.2
Saltzer, J.3
Needham, R.4
-
12
-
-
84867815751
-
Security weakness in a three-party password-based key exchange protocol using weil pairing
-
J. Nam, S. Kim, and D. Won, "Security weakness in a three-party password-based key exchange protocol using weil pairing," Cryptology ePrint Archive, 2005. (http://eprint.iacr.org/2005/269.pdf)
-
(2005)
Cryptology ePrint Archive
-
-
Nam, J.1
Kim, S.2
Won, D.3
-
14
-
-
56449100410
-
Enhanced password based key establishment protocol
-
Q. Tang, and C.J. Mitchell, "Enhanced password-based key establishment protocol," Cryptology ePrint Archive, 2005. (http://eprint.iacr.org/2005/ 141.pdf)
-
(2005)
Cryptology ePrint Archive
-
-
Tang, Q.1
Mitchell, C.J.2
-
15
-
-
40949152760
-
Password authentication schemes: Current status and key issues
-
C. S. Tsai, C. C. Lee, and M. S. Hwang, "Password authentication schemes: Current status and key issues," International Journal of Network Security, vol. 3, no. 2, pp. 101-115, 2006.
-
(2006)
International Journal of Network Security
, vol.3
, Issue.2
, pp. 101-115
-
-
Tsai, C.S.1
Lee, C.C.2
Hwang, M.S.3
-
16
-
-
21644467750
-
Provably secure three-party password based authenticated key exchange protocol using Weil pairing
-
H. A. Wen, T. F. Lee, and T. Hwang, "Provably secure three-party password based authenticated key exchange protocol using Weil pairing," IEE Proc-Commun, vol. 152, no. 2, pp. 138-143, 2005.
-
(2005)
IEE Proc Commun
, vol.152
, Issue.2
, pp. 138-143
-
-
Wen, H.A.1
Lee, T.F.2
Hwang, T.3
-
17
-
-
71649086263
-
Proof of forward security for password-based authenticated key exchange
-
S, Wu and Y, Zhu, "Proof of forward security for password-based authenticated key exchange," International Journal of Network Security, vol. 7, no. 3, pp. 335-341, 2008.
-
(2008)
International Journal of Network Security
, vol.7
, Issue.3
, pp. 335-341
-
-
Wu, S.1
Zhu, Y.2
|