-
2
-
-
1542593353
-
Authentication and authenticated key exchanges
-
W. Diffie, M. Wiener, and P. Van Oorschot Authentication and authenticated key exchanges Designs, Codes, and Cryptography 2 1992 107 125
-
(1992)
Designs, Codes, and Cryptography
, vol.2
, pp. 107-125
-
-
Diffie, W.1
Wiener, M.2
Van Oorschot, P.3
-
3
-
-
84945132563
-
Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords
-
Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
-
J. Katz, R. Ostrovsky, M. Yung, Efficient password-authenticated key exchange using human-memorable passwords, in: Proc. Eurocrypt 2001, LNCS 2045, Springer-Verlag, 2001, pp. 475-494. (Pubitemid 33275849)
-
(2001)
Lecture Notes in Computer Science
, Issue.2045
, pp. 475-494
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
4
-
-
24144491593
-
Password-based authenticated key exchange in the three-party setting
-
Public Key Cryptography - PKC 2005 - 8th International Workshop on Theory and Practice in Public Key Cryptography
-
M. Abdalla, P.A. Fouque, D. Pointcheval, Password based authenticated key exchange in the three-party setting, in: Proc. PKC'05, 2005, pp. 65-84. (Pubitemid 41231326)
-
(2005)
Lecture Notes in Computer Science
, vol.3386
, pp. 65-84
-
-
Abdalla, M.1
Fouque, P.-A.2
Pointcheval, D.3
-
5
-
-
74549221711
-
An efficient protocol for authenticated key agreement
-
L. Law, A. Menezes, M. Qu, J. Solinas, and S. Vanstone An efficient protocol for authenticated key agreement Designs, Codes and Cryptography 28 2003 119 134
-
(2003)
Designs, Codes and Cryptography
, vol.28
, pp. 119-134
-
-
Law, L.1
Menezes, A.2
Qu, M.3
Solinas, J.4
Vanstone, S.5
-
7
-
-
77950815727
-
A new approach for anonymous password authentication
-
Y. Yang, J. Zhou, J. Weng, F. Bao, A new approach for anonymous password authentication, in: Proc. Annual Computer Security Applications Conference (ACSAC 2009), 2009, pp. 199-208.
-
(2009)
Proc. Annual Computer Security Applications Conference (ACSAC 2009)
, pp. 199-208
-
-
Yang, Y.1
Zhou, J.2
Weng, J.3
Bao, F.4
-
8
-
-
75449106985
-
Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards
-
X. Li, W. Qiu, D. Zheng, K. Chen, and J. Li Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards IEEE Transactions on Industrial Electronics 57 2010 793 800
-
(2010)
IEEE Transactions on Industrial Electronics
, vol.57
, pp. 793-800
-
-
Li, X.1
Qiu, W.2
Zheng, D.3
Chen, K.4
Li, J.5
-
11
-
-
85016462400
-
Systematic design of two-party authentication protocols
-
R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva, M. Yung, Systematic design of two-party authentication protocols, in: Proc. Advances in Cryptology (Crypto'91), 1991, pp. 44-61.
-
(1991)
Proc. Advances in Cryptology (Crypto'91)
, pp. 44-61
-
-
Bird, R.1
Gopal, I.2
Herzberg, A.3
Janson, P.4
Kutten, S.5
Molva, R.6
Yung, M.7
-
12
-
-
0025771853
-
Applying a formal analysis technique to the CCITT X.509 strong two-way authentication protocol
-
K. Gaarder, and E. Snekkenes Applying a formal analysis technique to the CCITT X.509 strong two-way authentication protocol Journal of Cryptology 3 1991 81 98 (Pubitemid 21700571)
-
(1991)
Journal of Cryptology
, vol.3
, Issue.2
, pp. 81-98
-
-
Gaarder Klaus1
Snekkenes Einar2
-
16
-
-
4043095653
-
Efficient three-party key exchange using smart cards
-
W.S. Juang Efficient three-party key exchange using smart cards IEEE Transactions on Consumer Electronics 50 2004 619 624
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, pp. 619-624
-
-
Juang, W.S.1
-
17
-
-
38149019162
-
Token-based authenticated key establishment protocols for three-party communication
-
E.J. Yoon, K.Y. Yoo, Token-based authenticated key establishment protocols for three-party communication, in: Proc. the 2007 Conference on Emerging Direction in Embedded and Ubiquitous Computing, LNCS 4809, 2007, pp. 758-769.
-
(2007)
Proc the 2007 Conference on Emerging Direction in Embedded and Ubiquitous Computing, LNCS 4809
, pp. 758-769
-
-
Yoon, E.J.1
Yoo, K.Y.2
-
18
-
-
79959334053
-
Security design for three-party encrypted key exchange protocol using smart cards
-
C. Chang, J. Lee, T. Cheng, Security design for three-party encrypted key exchange protocol using smart cards, in: Proc. the 2nd International Conference on Ubiquitous Information Management and, Communication, 2008, pp. 329-333.
-
(2008)
Proc the 2nd International Conference on Ubiquitous Information Management And, Communication
, pp. 329-333
-
-
Chang, C.1
Lee, J.2
Cheng, T.3
-
21
-
-
48249135090
-
Enhanced three-round smart card-based key exchange protocol
-
E.J. Yoon, K.Y. Yoo, Enhanced three-round smart card-based key exchange protocol, in: Proc. the 5th International Conference on Autonomic and Trusted Computing (ATC 2008), LNCS 5060, 2008, pp. 507-515.
-
(2008)
Proc the 5th International Conference on Autonomic and Trusted Computing (ATC 2008), LNCS 5060
, pp. 507-515
-
-
Yoon, E.J.1
Yoo, K.Y.2
-
22
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
M. Bellare, P. Rogaway, Random oracles are practical: a paradigm for designing efficient protocols, in: Proc. the 1st ACM Conference on Computer and Communications, Security (CCS'93), 1993, pp. 62-73.
-
(1993)
Proc the 1st ACM Conference on Computer and Communications, Security (CCS'93)
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
24
-
-
18744393738
-
Security proofs for an efficient password-based key exchange
-
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
-
E. Bresson, O. Chevassut, D. Pointcheval, Security proofs for an efficient password-based key exchange, in: Proc. 10th ACM Conference on Computer and Communications, Security (CCS'03), 2003, pp. 241-250. (Pubitemid 40673806)
-
(2003)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 241-250
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
27
-
-
35048860626
-
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
-
Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
-
R. Canetti R,H. Krawczyk, Analysis of key-exchange protocols and their use for building secure channels, in: Proc. 20th International Conference on the Theory and Application of Cryptographic, Techniques (EUROCRYPT'01), 2001, pp. 453-474. (Pubitemid 33275848)
-
(2001)
Lecture Notes in Computer Science
, Issue.2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
|