-
2
-
-
0006805744
-
Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise
-
AT&T Bell Laboratories
-
Bellovin, S.M., Merritt, M., 1994. Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise. Technical report, AT&T Bell Laboratories.
-
(1994)
Technical Report
-
-
Bellovin, S.M.1
Merritt, M.2
-
3
-
-
0017018484
-
New directions in cryptography
-
Diffie, W., Hellman, M., 1976. New directions in cryptography. IEEEE Transactions on Information Theory 22 (6), 644-654.
-
(1976)
IEEEE Transactions on Information Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
4
-
-
0029531472
-
Optimal authentication protocols resistant to password guessing attacks
-
County Kerry, Ireland, June
-
Gong, L., 1995. Optimal authentication protocols resistant to password guessing attacks. In: Proceedings of the 8th IEEE Computer Security Foundation Workshop, County Kerry, Ireland, June, pp. 24-29.
-
(1995)
Proceedings of the 8th IEEE Computer Security Foundation Workshop
, pp. 24-29
-
-
Gong, L.1
-
5
-
-
0027615231
-
Protecting poorly chosen secrets from guessing attacks
-
Gong, L., Lomas, M.A., Needham, R., Saltzer, J., 1993. Protecting poorly chosen secrets from guessing attacks. IEEE Journal on Selected Areas in Communications 11 (5), 648-656.
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.5
, pp. 648-656
-
-
Gong, L.1
Lomas, M.A.2
Needham, R.3
Saltzer, J.4
-
6
-
-
0030261758
-
Strong password-only authenticated key exchange
-
Jablon, D., 1996. Strong password-only authenticated key exchange. Computer Communication Review 26 (5), 5-26.
-
(1996)
Computer Communication Review
, vol.26
, Issue.5
, pp. 5-26
-
-
Jablon, D.1
-
7
-
-
0013443819
-
Extended password methods immune to dictionary attack
-
Cambridge, MA, June
-
Jablon, D., 1997. Extended password methods immune to dictionary attack, In: WETICE '97 Enterprise Security Workshop, Cambridge, MA, June.
-
(1997)
WETICE '97 Enterprise Security Workshop
-
-
Jablon, D.1
-
9
-
-
0031680336
-
Efficient key exchange and authentication protocols protecting weak secrets
-
Kwon, T., Song, J., 1998. Efficient key exchange and authentication protocols protecting weak secrets. IEICE Transactions on Fundamentals E81-A (1), 156-163.
-
(1998)
IEICE Transactions on Fundamentals
, vol.E81-A
, Issue.1
, pp. 156-163
-
-
Kwon, T.1
Song, J.2
-
10
-
-
0032640752
-
xy via password authentication
-
xy via password authentication. Electronics Letters 35 (11), 892-893.
-
(1999)
Electronics Letters
, vol.35
, Issue.11
, pp. 892-893
-
-
Kwon, T.1
Song, J.2
-
11
-
-
0031381717
-
An adaptable and reliable authentication protocol for communication networks
-
Kobe, Japan
-
Kwon, T., Kang, M., Song, J., 1997. An Adaptable and reliable authentication protocol for communication networks. In: Proceedings of the IEEE INFOCOM 97, Kobe, Japan, pp. 738-745.
-
(1997)
Proceedings of the IEEE INFOCOM 97
, pp. 738-745
-
-
Kwon, T.1
Kang, M.2
Song, J.3
-
12
-
-
0033157651
-
An improvement of the password-based authentication protocol (K1P) on security against replay attacks
-
Kwon, T., Kang, M., Jung, S., Song, J., 1999. An improvement of the password-based authentication protocol (K1P) on security against replay attacks. IEICE Transactions on Communications E82-B (7), 991-997.
-
(1999)
IEICE Transactions on Communications
, vol.E82-B
, Issue.7
, pp. 991-997
-
-
Kwon, T.1
Kang, M.2
Jung, S.3
Song, J.4
-
13
-
-
0345686108
-
Open key exchange: How to defeat dictionary attacks without encrypting public keys
-
April. Springer-Verlag
-
Lucks, S., 1997. Open key exchange: how to defeat dictionary attacks without encrypting public keys. In: Proceedings of the Security Protocol Workshop '97, April. Springer-Verlag.
-
(1997)
Proceedings of the Security Protocol Workshop '97
-
-
Lucks, S.1
-
14
-
-
0002839106
-
Refinement and extension of encrypted key exchange
-
Steiner, M., Tsudik, G., Waidner, M., 1995. Refinement and extension of encrypted key exchange. Operating Systems Review 29 (3), 22-30.
-
(1995)
Operating Systems Review
, vol.29
, Issue.3
, pp. 22-30
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
|