-
1
-
-
84876788695
-
-
The Internet Key-Exchange (IKE), RFC 2409
-
Harkins D, Carreal D. The Internet Key-Exchange (IKE), RFC 2409, 1998.
-
(1998)
-
-
Harkins, D.1
Carreal, D.2
-
2
-
-
74549221711
-
An efficient protocol for authenticated key agreement
-
Law L, Menezes A, Qu M, Solinas J, Vanstone S. An efficient protocol for authenticated key agreement. Designs, Codes and Cryptography 2003; 28(2):119-134.
-
(2003)
Designs, Codes and Cryptography
, vol.28
, Issue.2
, pp. 119-134
-
-
Law, L.1
Menezes, A.2
Qu, M.3
Solinas, J.4
Vanstone, S.5
-
3
-
-
84945132563
-
Efficient password authenticated key exchange using human-memorable passwords
-
Katz J, Ostrovsky R, Yung M. Efficient password authenticated key exchange using human-memorable passwords. In Proceedings of the Eurocrypt 2001, 2001; 475-494.
-
(2001)
Proceedings of the Eurocrypt 2001
, pp. 475-494
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
4
-
-
84876787327
-
-
The AuthA protocol for password-based authenticated key exchange. IEEE P1363
-
Bellare M, Rogaway P. The AuthA protocol for password-based authenticated key exchange. IEEE P1363, 2000.
-
(2000)
-
-
Bellare, M.1
Rogaway, P.2
-
6
-
-
0028288854
-
An attack on the Interlock Protocol when used for authentication
-
Bellovin S, Merritt M. An attack on the Interlock Protocol when used for authentication. IEEE Transactions on Information Theory 1994; 40(1):273-275.
-
(1994)
IEEE Transactions on Information Theory
, vol.40
, Issue.1
, pp. 273-275
-
-
Bellovin, S.1
Merritt, M.2
-
7
-
-
4043167845
-
Security improvement on a timestamp-based password authentication scheme
-
Wang Y, Li J. Security improvement on a timestamp-based password authentication scheme. IEEE Transactions on Consumer Electronics 2004; 50(2):580-582.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.2
, pp. 580-582
-
-
Wang, Y.1
Li, J.2
-
9
-
-
52949137008
-
Two-factor mutual authentication based on smart cards and passwords
-
Yang GM, Wong DS, Wang HX, Deng XT. Two-factor mutual authentication based on smart cards and passwords. Journal of Computer and System Sciences 2008; 74(7):1160-1172.
-
(2008)
Journal of Computer and System Sciences
, vol.74
, Issue.7
, pp. 1160-1172
-
-
Yang, G.M.1
Wong, D.S.2
Wang, H.X.3
Deng, X.T.4
-
10
-
-
77956377490
-
A bilateral remote user authentication scheme that preserves user anonymity
-
Tseng HR, Jan RH, Yang W. A bilateral remote user authentication scheme that preserves user anonymity. Security and Communication Networks 2008; 1:301-308.
-
(2008)
Security and Communication Networks
, vol.1
, pp. 301-308
-
-
Tseng, H.R.1
Jan, R.H.2
Yang, W.3
-
11
-
-
0019634370
-
Password authentication with insecure communication
-
Lamport L. Password authentication with insecure communication. Communications of the ACM 1981; 24(11):770-772.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
12
-
-
0036302680
-
An efficient and practical solution to remote authentication: smart card
-
Chien HY, Jan JK, Tseng YM. An efficient and practical solution to remote authentication: smart card. Computers & Security 2002; 21(4):372-375.
-
(2002)
Computers & Security
, vol.21
, Issue.4
, pp. 372-375
-
-
Chien, H.Y.1
Jan, J.K.2
Tseng, Y.M.3
-
13
-
-
0742268499
-
Security of Chien 's remote user authentication scheme using smart cards
-
Hsu CL. Security of Chien et al.'s remote user authentication scheme using smart cards. Computer Standards & Interfaces 2004; 26(3):167-169.
-
(2004)
Computer Standards & Interfaces
, vol.26
, Issue.3
, pp. 167-169
-
-
Hsu, C.L.1
-
14
-
-
4043152192
-
Further improvement of an efficient password based remote user authentication scheme using smart cards
-
Yoon EJ, Ryu KY. Further improvement of an efficient password based remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 2004; 50(2):612-614.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.2
, pp. 612-614
-
-
Yoon, E.J.1
Ryu, K.Y.2
-
15
-
-
34248666700
-
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
-
Wang X, Zhang W, Zhang J, Khan M. Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards. Computer Standards & Interfaces 2007; 29(5):507-512.
-
(2007)
Computer Standards & Interfaces
, vol.29
, Issue.5
, pp. 507-512
-
-
Wang, X.1
Zhang, W.2
Zhang, J.3
Khan, M.4
-
16
-
-
62549133356
-
Robust and efficient password authenticated key agreement using smart cards
-
Juang WS, Chen ST, Liaw HT. Robust and efficient password authenticated key agreement using smart cards. IEEE Transaction on Industrial Electronics 2008; 55(6):2551-2556.
-
(2008)
IEEE Transaction on Industrial Electronics
, vol.55
, Issue.6
, pp. 2551-2556
-
-
Juang, W.S.1
Chen, S.T.2
Liaw, H.T.3
-
17
-
-
67649386419
-
Improvements of Juang 's password-authenticated key agreement scheme using smart cards
-
Sun DZ, Huai JP, Sun JZ, Li JX, Zhang JW, Feng ZY. Improvements of Juang et al.'s password-authenticated key agreement scheme using smart cards. IEEE Transaction on Industrial Electronics 2009; 56(6):2284-2291.
-
(2009)
IEEE Transaction on Industrial Electronics
, vol.56
, Issue.6
, pp. 2284-2291
-
-
Sun, D.Z.1
Huai, J.P.2
Sun, J.Z.3
Li, J.X.4
Zhang, J.W.5
Feng, Z.Y.6
-
18
-
-
75449106985
-
Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards
-
Li XX, Qiu WD, Zheng D, Chen KF, Li JH. Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards. IEEE Transaction on Industrial Electronics 2010; 57(2):793-800.
-
(2010)
IEEE Transaction on Industrial Electronics
, vol.57
, Issue.2
, pp. 793-800
-
-
Li, X.X.1
Qiu, W.D.2
Zheng, D.3
Chen, K.F.4
Li, J.H.5
-
19
-
-
33746215179
-
On the resilience of key agreement protocols to key compromise impersonation
-
Strangio MA. On the resilience of key agreement protocols to key compromise impersonation. In Proceedings of EuroPKI 2006, 2006; 233-247.
-
(2006)
Proceedings of EuroPKI 2006
, pp. 233-247
-
-
Strangio, M.A.1
-
20
-
-
33745179557
-
HMQV: a high-performance secure Diffie-Hellman protocol
-
Krawczyk H. HMQV: a high-performance secure Diffie-Hellman protocol. In Proceedings of Crypto 2005, 2005; 546-566.
-
(2005)
Proceedings of Crypto 2005
, pp. 546-566
-
-
Krawczyk, H.1
-
24
-
-
84876783591
-
Cryptology and the birthday paradox
-
Meijer AR. Cryptology and the birthday paradox. The UMAP Journal 1996; 17(1):71-84.
-
(1996)
The UMAP Journal
, vol.17
, Issue.1
, pp. 71-84
-
-
Meijer, A.R.1
|