Authenticated key exchange protocols resistant to password guessing attacks
暂无分享,去创建一个
[1] Jerome H. Saltzer,et al. Reducing risks from poorly chosen keys , 1989, SOSP '89.
[2] Li Gong,et al. Optimal authentification protocols resistant to password guessing attacks , 1995, Proceedings The Eighth IEEE Computer Security Foundations Workshop.
[3] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[4] Giovanni Maria Sacco,et al. Timestamps in key distribution protocols , 1981, CACM.
[5] Owen Rees,et al. Efficient and timely mutual authentication , 1987, OPSR.
[6] Li Gong,et al. Verifiable-text attacks in cryptographic protocols , 1990, Proceedings. IEEE INFOCOM '90: Ninth Annual Joint Conference of the IEEE Computer and Communications Societies@m_The Multiple Facets of Integration.
[7] Ken Thompson,et al. Password security: a case history , 1979, CACM.
[8] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[9] Patrick Horster,et al. Undetectable on-line password guessing attacks , 1995, OPSR.
[10] Jerome H. Saltzer,et al. Protecting Poorly Chosen Secrets from Guessing Attacks , 1993, IEEE J. Sel. Areas Commun..