메뉴 건너뛰기




Volumn 75, Issue 1-2, 2005, Pages 63-68

Secure key agreement protocols for three-party against guessing attacks

Author keywords

Cryptography; EKE); Encrypted key exchange (; Guessing attacks; Three party EKE; Verifier based

Indexed keywords

COMMUNICATION; COMPUTATIONAL METHODS; CRYPTOGRAPHY; INFORMATION ANALYSIS; RESEARCH AND DEVELOPMENT MANAGEMENT; SERVERS;

EID: 9544230689     PISSN: 01641212     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jss.2003.11.017     Document Type: Article
Times cited : (88)

References (15)
  • 2
    • 0006805744 scopus 로고
    • Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise
    • AT&T Bell Laboratories
    • Bellovin, S.M., Merritt, M., 1994. Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise. Technical report, AT&T Bell Laboratories.
    • (1994) Technical Report
    • Bellovin, S.M.1    Merritt, M.2
  • 4
    • 0029531472 scopus 로고
    • Optimal authentication protocols resistant to password guessing attacks
    • County Kerry, Ireland, June
    • Gong, L., 1995. Optimal authentication protocols resistant to password guessing attacks. In: Proceedings of the 8th IEEE Computer Security Foundation Workshop, County Kerry, Ireland, June, pp. 24-29.
    • (1995) Proceedings of the 8th IEEE Computer Security Foundation Workshop , pp. 24-29
    • Gong, L.1
  • 6
    • 0030261758 scopus 로고    scopus 로고
    • Strong password-only authenticated key exchange
    • Jablon, D., 1996. Strong password-only authenticated key exchange. Computer Communication Review 26 (5), 5-26.
    • (1996) Computer Communication Review , vol.26 , Issue.5 , pp. 5-26
    • Jablon, D.1
  • 7
    • 0013443819 scopus 로고    scopus 로고
    • Extended password methods immune to dictionary attack
    • Cambridge, MA, June
    • Jablon, D., 1997. Extended password methods immune to dictionary attack, In: WETICE '97 Enterprise Security Workshop, Cambridge, MA, June.
    • (1997) WETICE '97 Enterprise Security Workshop
    • Jablon, D.1
  • 9
    • 0031680336 scopus 로고    scopus 로고
    • Efficient key exchange and authentication protocols protecting weak secrets
    • Kwon, T., Song, J., 1998. Efficient key exchange and authentication protocols protecting weak secrets. IEICE Transactions on Fundamentals E81-A (1), 156-163.
    • (1998) IEICE Transactions on Fundamentals , vol.E81-A , Issue.1 , pp. 156-163
    • Kwon, T.1    Song, J.2
  • 10
    • 0032640752 scopus 로고    scopus 로고
    • xy via password authentication
    • xy via password authentication. Electronics Letters 35 (11), 892-893.
    • (1999) Electronics Letters , vol.35 , Issue.11 , pp. 892-893
    • Kwon, T.1    Song, J.2
  • 11
    • 0031381717 scopus 로고    scopus 로고
    • An adaptable and reliable authentication protocol for communication networks
    • Kobe, Japan
    • Kwon, T., Kang, M., Song, J., 1997. An Adaptable and reliable authentication protocol for communication networks. In: Proceedings of the IEEE INFOCOM 97, Kobe, Japan, pp. 738-745.
    • (1997) Proceedings of the IEEE INFOCOM 97 , pp. 738-745
    • Kwon, T.1    Kang, M.2    Song, J.3
  • 12
    • 0033157651 scopus 로고    scopus 로고
    • An improvement of the password-based authentication protocol (K1P) on security against replay attacks
    • Kwon, T., Kang, M., Jung, S., Song, J., 1999. An improvement of the password-based authentication protocol (K1P) on security against replay attacks. IEICE Transactions on Communications E82-B (7), 991-997.
    • (1999) IEICE Transactions on Communications , vol.E82-B , Issue.7 , pp. 991-997
    • Kwon, T.1    Kang, M.2    Jung, S.3    Song, J.4
  • 13
    • 0345686108 scopus 로고    scopus 로고
    • Open key exchange: How to defeat dictionary attacks without encrypting public keys
    • April. Springer-Verlag
    • Lucks, S., 1997. Open key exchange: how to defeat dictionary attacks without encrypting public keys. In: Proceedings of the Security Protocol Workshop '97, April. Springer-Verlag.
    • (1997) Proceedings of the Security Protocol Workshop '97
    • Lucks, S.1
  • 14
    • 0002839106 scopus 로고
    • Refinement and extension of encrypted key exchange
    • Steiner, M., Tsudik, G., Waidner, M., 1995. Refinement and extension of encrypted key exchange. Operating Systems Review 29 (3), 22-30.
    • (1995) Operating Systems Review , vol.29 , Issue.3 , pp. 22-30
    • Steiner, M.1    Tsudik, G.2    Waidner, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.