메뉴 건너뛰기




Volumn 8, Issue 8, 2013, Pages 1318-1330

A scalable transitive human-verifiable authentication protocol for mobile devices

Author keywords

Human verifiable authentication protocol; mobile security

Indexed keywords

AUTHENTICATION PROTOCOLS; CONFERENCE KEY; FORMAL PROOFS; HAND HELD DEVICE; MAN-IN-THE-MIDDLE (MITM) ATTACK; MOBILE SECURITY; SESSION KEY;

EID: 84880649806     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2013.2270106     Document Type: Article
Times cited : (40)

References (31)
  • 1
    • 0027741529 scopus 로고
    • Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise
    • S. M. Bellovin and M. Merritt, "Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise," in Proc. 1st ACM Conf. Comput. and Communications Security, 1993, pp. 244-250.
    • (1993) Proc. 1st ACM Conf. Comput. and Communications Security , pp. 244-250
    • Bellovin, S.M.1    Merritt, M.2
  • 2
    • 0030261758 scopus 로고    scopus 로고
    • Strong password-only authenticated key exchange
    • D. P. Jablon, "Strong password-only authenticated key exchange," ACM SIGCOMM Comput. Commun. Rev., vol. 26, no. 5, pp. 5-26, 1996.
    • (1996) ACM SIGCOMM Comput. Commun. Rev , vol.26 , Issue.5 , pp. 5-26
    • Jablon, D.P.1
  • 4
    • 84937550984 scopus 로고    scopus 로고
    • Provably secure passwordauthenticated key exchange using Diffie-Heilman
    • V. Boyko, P. MacKenzie, and S. Patel, "Provably secure passwordauthenticated key exchange using Diffie-Heilman," in Proc. Advances in Cryptology-Eurocrypt, 2000, pp. 156-171.
    • (2000) Proc. Advances in Cryptology-Eurocrypt , pp. 156-171
    • Boyko, V.1    Mackenzie, P.2    Patel, S.3
  • 6
    • 33645422534 scopus 로고    scopus 로고
    • Entity authentication and authenticated key transport protocols employing asymmetric techniques
    • S. Blake-Wilson and A. Menezes, "Entity authentication and authenticated key transport protocols employing asymmetric techniques," in Proc. Security Protocols Workshop, 1997, vol. 97.
    • (1997) Proc. Security Protocols Workshop , vol.97
    • Blake-Wilson, S.1    Menezes, A.2
  • 8
    • 23944521144 scopus 로고    scopus 로고
    • Manual authentication for wireless devices
    • C. Gehrmann, C. Mitchell, and K. Nyberg, "Manual authentication for wireless devices," RSA Cryptobytes, vol. 7, no. 1, pp. 29-37, 2004.
    • (2004) RSA Cryptobytes , vol.7 , Issue.1 , pp. 29-37
    • Gehrmann, C.1    Mitchell, C.2    Nyberg, K.3
  • 10
  • 13
    • 19944391466 scopus 로고    scopus 로고
    • Using camera-equipped mobile phones for interacting with real-world objects
    • M. Rohs and B. Gfeller, "Using camera-equipped mobile phones for interacting with real-world objects," in Proc. Advances in Pervasive Computing, 2004, pp. 265-271.
    • (2004) Proc. Advances in Pervasive Computing , pp. 265-271
    • Rohs, M.1    Gfeller, B.2
  • 14
    • 23944461491 scopus 로고    scopus 로고
    • A one round protocol for tripartite Diffie-Hellman
    • A. Joux, "A one round protocol for tripartite Diffie-Hellman," J. Cryptology, vol. 17, no. 4, pp. 263-276, 2004.
    • (2004) J. Cryptology , vol.17 , Issue.4 , pp. 263-276
    • Joux, A.1
  • 17
    • 33744908245 scopus 로고    scopus 로고
    • Secure communications over insecure channels based on short authenticated strings
    • S. Vaudenay, "Secure communications over insecure channels based on short authenticated strings," in Proc. Advances in Cryptology, 2005, vol. 5, pp. 309-326.
    • (2005) Proc. Advances in Cryptology , vol.5 , pp. 309-326
    • Vaudenay, S.1
  • 20
    • 0346265020 scopus 로고    scopus 로고
    • Extending Joux's protocol to multi party key agreement
    • R. Barua, R. Dutta, and P. Sarkar, "Extending Joux's protocol to multi party key agreement," Prog. Cryptology-INDOCRYPT, pp. 205-217, 2003.
    • (2003) Prog. Cryptology-INDOCRYPT , pp. 205-217
    • Barua, R.1    Dutta, R.2    Sarkar, P.3
  • 21
    • 35048854587 scopus 로고    scopus 로고
    • An efficient signature scheme from bilinear pairings and its applications
    • New York, NY, USA: Springer
    • F. Z. R. Safavi-Naini and W. Susilo, "An efficient signature scheme from bilinear pairings and its applications," in Public Key Cryptography-PKC 2004. New York, NY, USA: Springer, 2004, pp. 277-290.
    • (2004) Public Key Cryptography-PKC , pp. 277-290
    • Safavi-Naini, F.Z.R.1    Susilo, W.2
  • 25
    • 84878347506 scopus 로고    scopus 로고
    • Flash memory for ubiquitous hardware security functions: True random number generation and device fingerprints
    • Y. Wang, W.-K. Yu, S. Wu, G. Malysa, G. E. Suh, and E. C. Kan, "Flash memory for ubiquitous hardware security functions: True random number generation and device fingerprints," in Proc. IEEE Symp. Security and Privacy, 2012, pp. 33-47.
    • (2012) Proc. IEEE Symp. Security and Privacy , pp. 33-47
    • Wang, Y.1    Yu, W.-K.2    Wu, S.3    Malysa, G.4    Suh, G.E.5    Kan, E.C.6
  • 26
    • 0036082995 scopus 로고    scopus 로고
    • Optical time-domain eavesdropping risks of crt displays
    • M. G. Kuhn, "Optical time-domain eavesdropping risks of crt displays," in Proc. IEEE Symp. Security and Privacy, 2002, pp. 3-18.
    • (2002) Proc. IEEE Symp. Security and Privacy , pp. 3-18
    • Kuhn, M.G.1
  • 30
    • 84880669079 scopus 로고    scopus 로고
    • ISO/IEC 18004:2000. Information Technology-Automatic Identification and Data Capture Techniques-bar Code Symbology-QR Code 2000
    • ISO/IEC 18004:2000. Information Technology-Automatic Identification and Data Capture Techniques-bar Code Symbology-QR Code 2000.
  • 31
    • 84880655072 scopus 로고    scopus 로고
    • ZBar bar Code Reader Jul
    • ZBar bar Code Reader, Jul. 2011 [Online]. Available: http://zbar. sourceforge.net/
    • (2011)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.