최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기情報保護學會論文誌 = Journal of the Korea Institute of Information Security and Cryptology, v.16 no.6, 2006년, pp.73 - 80
Recently, Sun et el. proposed a three-party authenticated key exchange protocol using the public key of the server and the derived verifier from the Password of a user. This paper proposes a password-based three-party authenticated key exchange protocol using smartcards. Since the proposed protocol ...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
W. Diffie and M.E. Hellman, 'New directions in cryptography,' IEEE Trans., Vol. IT-22, No. 6, pp. 644-654, 1976
S. M. Bellovin and M. Merrit, 'Encrypted key exchange: Passwordbased protocols secure against dictionary attacks,' Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 72-84, 1992
S.M. Bellovin and M. Merritt, 'Augmented encrypted key exchange : a password-based protocol secure against dictionary attacks and password file compromise,' Technical report, AT&T Bell Laboratories, 1994
T. Kwon and J. Song, 'Secure agreement scheme for $g^{xy}$ via password authentication,' Electronics Letters Vol. 35, No. 11, pp.892-893, 1999
M. Steiner, G. Tsudik, and M. Waidner, 'Refinement and extension of Encrypted Key Exchange,' ACM Operating Systems Review, Vol. 29, No. 3, pp. 22-30, 1995
Y. Ding and P. Horster, 'Undetectable on-line password guessing attacks,' ACM Operating Systems Review, Vol. 29, No. 4, pp. 77-86, 1995
C. Lin, H. Sun, and T. Hwang, 'Three-party encrypted key exchange: Attacks and a solution,' ACM Operating Systems Review, Vol. 34, No. 4, pp. 12-20, 2000
C. Lin, H. Sun, M. Steiner, and T. Hwang, 'Three-party Encrypted Key Exchange Without Server Public-Keys,' IEEE Communication Letters, Vol. 5, No. 12, pp. 497-499, 2001
H. Sun, B. Chen, and T. Hwang, 'Secure key agreement protocols for three-party against guessing attacks,' The Journal of Systems and Software, Vol. 75, pp.63-68, 2005
W.C. Ku and S.M. Chen, 'Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards,' IEEE Trans. on Consumer Electron., Vol. 50, No. 1, pp. 204-207, 2004
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.