-
1
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Springer- Verlag
-
M. Bellare, D. Pointcheval and P. Rogaway, “Authenticated key exchange secure against dictionary attacks”, Eurocrypt’00, LNCS Vol.1807, pp.139-155, Springer- Verlag, 2000.
-
(2000)
Eurocrypt’00, LNCS Vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
2
-
-
0026850091
-
Encrypted key exchange: Password based protocols secure against dictionary attacks
-
IEEE
-
S. Bellovin and M. Merrit, “Encrypted key exchange: password based protocols secure against dictionary attacks”, In Proceedings of the Symposium on Security and Privacy, pp.72-84, IEEE, 1992.
-
(1992)
Proceedings of the Symposium on Security and Privacy
, pp. 72-84
-
-
Bellovin, S.1
Merrit, M.2
-
3
-
-
84956854891
-
Key establishment protocols for secure mobile communications: A selective survey
-
Springer-Verlag
-
C. Boyd, A. Mathuria, “Key establishment protocols for secure mobile communications: A selective survey”, ACISP’98, LNCS Vol.1438, pp.344-355, Springer-Verlag, 1998.
-
(1998)
ACISP’98, LNCS Vol.1438
, pp. 344-355
-
-
Boyd, C.1
Mathuria, A.2
-
4
-
-
84937550984
-
Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman
-
Springer-Verlag
-
V. Boyko, P. MacKenzie, and S. Patel, “Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman”, Eurocrypt’00, LNCS Vol.1807, pp.156-171, Springer-Verlag, 2000
-
(2000)
Eurocrypt’00, LNCS Vol.1807
, pp. 156-171
-
-
Boyko, V.1
Mackenzie, P.2
Patel, S.3
-
5
-
-
84947224925
-
Efficient kerberized multicast in a practical distributed setting
-
Springer-Verlag
-
G. D. Crescenzo, O. Kornievskaia, “Efficient kerberized multicast in a practical distributed setting”, ISC’01, LNCS Vol.2200, pp.27-45, Springer-Verlag, 2001.
-
(2001)
ISC’01, LNCS Vol.2200
, pp. 27-45
-
-
Crescenzo, G.D.1
Kornievskaia, O.2
-
6
-
-
84976665942
-
Timestamps in key distribution protocols
-
D. Denning, G. Sacco, “Timestamps in key distribution protocols”, Communications of the ACM, Vol.24, No.8, pp.533-536, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.8
, pp. 533-536
-
-
Denning, D.1
Sacco, G.2
-
7
-
-
0030261758
-
Strong password-only authenticated key exchange
-
D. Jablon, “Strong password-only authenticated key exchange”, Computer Communication Review, Vol.26, No.5, pp.5-26, 1996.
-
(1996)
Computer Communication Review
, vol.26
, Issue.5
, pp. 5-26
-
-
Jablon, D.1
-
8
-
-
84880888233
-
Session-Key Generation Using Human Passwords Only
-
Springer-Verlag
-
O. Goldreich and Y. Lindell, “Session-Key Generation Using Human Passwords Only”, Crypto’01, LNCS Vol.2139, pp.408-432, Springer-Verlag, 2001.
-
(2001)
Crypto’01, LNCS Vol.2139
, pp. 408-432
-
-
Goldreich, O.1
Lindell, Y.2
-
9
-
-
85084161708
-
Dual-workfactor encrypted key exchange: Efficiency preventing password chaining attacks
-
July
-
B. Jaspan, “Dual-workfactor encrypted key exchange: Efficiency preventing password chaining attacks”, In Proceedings of the sixth annual USENIX security conference, pp.43-50, July 1996.
-
(1996)
Proceedings of the Sixth Annual USENIX Security Conference
, pp. 43-50
-
-
Jaspan, B.1
-
10
-
-
0003735746
-
-
Internet draft, May
-
M. Hur, B. Tung, T. Ryutov, C. Neuman, A. Medvinsky, G. Tsudik, and B. Sommerfeld, “Pulbic key cryptography for cross-realm authentication in kerberos”, Internet draft, May 2001.
-
(2001)
Pulbic Key Cryptography for Cross-Realm Authentication in Kerberos
-
-
Hur, M.1
Tung, B.2
Ryutov, T.3
Neuman, C.4
Medvinsky, A.5
Tsudik, G.6
Sommerfeld, B.7
-
11
-
-
84945132563
-
Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords
-
Springer-Verlag
-
J. Katz, R. Ostrovsky and M. Yung, “Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords”, Eurocrypt’01, LNCS Vol.2045, pp.475-494, Springer-Verlag, 2001.
-
(2001)
Eurocrypt’01, LNCS Vol.2045
, pp. 475-494
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
12
-
-
0345686108
-
Open key exchange: How to defeat dictionary attacks without encryting public keys
-
S. Lucks, “Open key exchange: How to defeat dictionary attacks without encryting public keys”, The security Protocol Workshop’97, pp.79-90, 1997.
-
(1997)
The Security Protocol Workshop’97
, pp. 79-90
-
-
Lucks, S.1
-
13
-
-
0002839106
-
Refinement and extension of encrypted key exchange
-
M. Steiner, G. Tsudik, and M. Waider, “Refinement and extension of encrypted key exchange”, ACM Operation Sys. Review, Vol.29, No.3, pp.22-30, 1995.
-
(1995)
ACM Operation Sys. Review
, vol.29
, Issue.3
, pp. 22-30
-
-
Steiner, M.1
Tsudik, G.2
Waider, M.3
-
14
-
-
0003700417
-
-
Section E.2.1, Project Athena Technical Plan, M.I.T, October
-
S. P. Miller, B. C. Neuman, J. I. Schiller, J. H. Saltzer, “Kerberos Authentication and Authorization System”, Section E.2.1, Project Athena Technical Plan, M.I.T. October 1988.
-
(1988)
Kerberos Authentication and Authorization System
-
-
Miller, S.P.1
Neuman, B.C.2
Schiller, J.I.3
Saltzer, J.H.4
|