메뉴 건너뛰기




Volumn 181, Issue , 2005, Pages 95-111

A new architecture for user authentication and key exchange using password for federated enterprises

Author keywords

Dictionary attack; Federated enterprise; Key exchange; Password authentication; Public key cryptosystem

Indexed keywords

COMPUTER CRIME; INTERNET PROTOCOLS; NETWORK ARCHITECTURE; PUBLIC KEY CRYPTOGRAPHY; UBIQUITOUS COMPUTING; SECURITY OF DATA;

EID: 84885037793     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: 10.1007/0-387-25660-1_7     Document Type: Conference Paper
Times cited : (15)

References (21)
  • 2
    • 0040231044 scopus 로고
    • Foiling the Cracker-A Survey of, and Improvements to, Password Security
    • in
    • D. V. Klein, Foiling the Cracker-A Survey of, and Improvements to, Password Security, in: 2nd USENIXSecurity, pp. 5-14, 1990
    • (1990) 2nd USENIXSecurity , pp. 5-14
    • Klein, D.V.1
  • 4
    • 0026850091 scopus 로고
    • Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks
    • in
    • S. Bellovin, and M. Merritt, Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks, in: IEEE Symposium on Research in Security and Privacy, pp. 72-84, 1992.
    • (1992) IEEE Symposium on Research in Security and Privacy , pp. 72-84
    • Bellovin, S.1    Merritt, M.2
  • 5
    • 0027741529 scopus 로고
    • Augmented Encrypted Key Exchange: A Password-Based Protocol Secure Against Dictionary Attacks and Password File Compromise
    • in
    • S. Bellovin and M. Merritt, Augmented Encrypted Key Exchange: A Password-Based Protocol Secure Against Dictionary Attacks and Password File Compromise, in: ACM. Computer and Communication Seczrrity, pp. 244-250, 1993.
    • (1993) ACM. Computer and Communication Seczrrity , pp. 244-250
    • Bellovin, S.1    Merritt, M.2
  • 6
    • 84945132563 scopus 로고    scopus 로고
    • Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords
    • in, Euvoclypt'Ol, LNCS 2045
    • J. Katz, R. Ostrovsky, and M. Yung, Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords, in: Advances in Cpptolog., Euvoclypt'Ol, LNCS 2045, pp. 475-494,2001
    • (2001) Advances in Cpptolog , pp. 475-494
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 10
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated Key Exchange Secure against Dictionary Attacks
    • in, Eurocryptl OO
    • M. Bellare, D. Pointcheval, and P. Rogaway, Authenticated Key Exchange Secure against Dictionary Attacks, in: Advance in cryptology, Eurocryptl OO, pp. 139-155,2000.
    • (2000) Advance in cryptology , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 13
    • 84937539386 scopus 로고    scopus 로고
    • Password Authentication Using Multiple Servers
    • in, LNCS 2020
    • D. P. Jablon, Password Authentication Using Multiple Servers, in: RSA Security Conference, LNCS 2020, pp. 344-360,2001.
    • (2001) RSA Security Conference , pp. 344-360
    • Jablon, D.P.1
  • 14
    • 84937438236 scopus 로고    scopus 로고
    • Threshold Password-Authenticated Key Exchange
    • in, Cryptor02, LNCS 2442
    • P. Mackenzie, T. Shrimpton, and M. Jakobsson, Threshold Password-Authenticated Key Exchange, in: Advances in Cryptology, Cryptor02, LNCS 2442, pp. 385-400,2002.
    • (2002) Advances in Cryptology , pp. 385-400
    • McKenzie, P.1    Shrimpton, T.2    Jakobsson, M.3
  • 15
    • 35248822669 scopus 로고    scopus 로고
    • Provably Secure Threshold Password-Authenticated Key Exchange
    • in, Ezrrocrypt103, LNCS 2656
    • M. D. Raimondo, and R. Gennaro, Provably Secure Threshold Password-Authenticated Key Exchange, in: Advances in Cryptology, Ezrrocrypt103, LNCS 2656, pp. 507-523,2003.
    • (2003) Advances in Cryptology , pp. 507-523
    • Raimondo, M.D.1    Gennaro, R.2
  • 16
    • 0027726717 scopus 로고
    • Random Oracles are Practical: A Paradigm for Designing Efficient Protocols
    • in
    • M. Bellare, P. Rogaway, Random Oracles are Practical: A Paradigm for Designing Efficient Protocols, in: ACM. Computer and Communication Sectrvity, pp. 62-73, 1993.
    • (1993) ACM. Computer and Communication Sectrvity , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 17
  • 18
    • 0018545449 scopus 로고
    • How To Share A Secret
    • A. Shamir, How To Share A Secret, Communications of the ACM, Volume 22, pp. 612-613, 1979.
    • (1979) Communications of the ACM , vol.22 , pp. 612-613
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.