Communication-efficient three-party protocols for authentication and key agreement
暂无分享,去创建一个
Chia-Mei Chen | Shiueng-Bien Yang | Jenn-Long Liu | Tian-Fu Lee | Mei-Jiun Sung | Shiueng-Bien Yang | Jenn-Long Liu | Chia-Mei Chen | Tian-Fu Lee | Mei-Jiun Sung
[1] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[2] Patrick Horster,et al. Undetectable on-line password guessing attacks , 1995, OPSR.
[3] Hung-Min Sun,et al. Efficient Three-Party Authentication and Key Agreement Protocols Resistant to Password Guessing Attacks , 2003, J. Inf. Sci. Eng..
[4] Steven M. Bellovin,et al. Encrypted key exchange: password-based protocols secure against dictionary attacks , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[5] Taekyoung Kwon,et al. Efficient Key Exchange and Authentication Protocols Protecting Weak Secrets , 1998 .
[6] Hung-Min Sun,et al. Three-party encrypted key exchange: attacks and a solution , 2000, OPSR.
[7] Taekyoung Kwon,et al. An adaptable and reliable authentication protocol for communication networks , 1997, Proceedings of INFOCOM '97.
[8] Kai-Yeung Siu,et al. Efficient protocols secure against guessing and replay attacks , 1995, Proceedings of Fourth International Conference on Computer Communications and Networks - IC3N'95.
[9] Jerome H. Saltzer,et al. Protecting Poorly Chosen Secrets from Guessing Attacks , 1993, IEEE J. Sel. Areas Commun..
[10] David P. Jablon. Strong password-only authenticated key exchange , 1996, CCRV.
[11] Stefan Lucks,et al. Open Key Exchange: How to Defeat Dictionary Attacks Without Encrypting Public Keys , 1997, Security Protocols Workshop.
[12] Gene Tsudik,et al. Refinement and extension of encrypted key exchange , 1995, OPSR.
[13] Taekyoung Kwon,et al. Authenticated key exchange protocols resistant to password guessing attacks , 1998 .
[14] David P. Jablon. Extended password key exchange protocols immune to dictionary attack , 1997, Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[15] Li Gong,et al. Optimal authentification protocols resistant to password guessing attacks , 1995, Proceedings The Eighth IEEE Computer Security Foundations Workshop.
[16] Taekyoung Kwon,et al. An Improvement of the Password-Based Authentication Protocol (K1P) on Security against Replay Attacks , 1999 .