Information Technology Reference
In-Depth Information
References
[1] Simpson, W.: Request for Comments 1994, PPP Challenge Handshake Authentication
Protocol (CHAP). Network Working Group, California (1996)
[2] Youssef, M.W., El-Gendy, H.: Securing Authentication of TCP/IP Layer Two by
Modifying Challenge-Handshake Authentication Protocol. Advanced Computing: An
International Journal (ACIJ) 3(2) (March 2012)
[3] Zorn, G.: Request for Comments: 2759: Microsoft PPP CHAP Extensions- Version 2,
Network Working Group, Microsoft Corporation (2000)
[4] Dolev, Yao, A.: On the Security of Public Key Protocols. IEEE Transactions on
Information Theory 29(2), 198-208 (1983)
[5] Verification of two versions of the Challenge Handshake Authentication Protocol
(CHAP), Guy Leduc, Research Unit in Networking (RUN)
[6] Goldreich, O.: Zero-knowledge twenty years after its invention (2002) (unpublished
manuscript)
[7] Zero-knowledge proof. Wikipedia, The Free Encyclopedia,
http://en.wikipedia.org/wiki/Zero-knowledge_proof
[8] Zero-knowledge password proof Wikepedia, The Free Encyclopedia,
http://en.wikipedia.org/wiki/Zero-knowledge_password_proof
[9] Challenging epistemology: Interactive proofs and zero knowledge Justin Bledin Group in
Logic and the Methodology of Science. Journal of Applied Logic 6, 490-501 (2008)
[10] Mohr, A.: A Survey of Zero-Knowledge Proofs with Applications to Cryptography.
Southern Illinois University, Carbondale
[11] “Password Authentication Protocol” Wikipedia, the free encyclopedia,
http://en.wikipedia.org/wiki/Password_authentication_
protocol
[12] Microsoft TechNet, Authentication Methods,
http://technet.microsoft.com/en-us/library/cc958013.aspx
[13] Microsoft Technet, Password Authentication Protocol,
http://technet.microsoft.com/enus/library/
cc737807%28v=ws.10%29
[14] Lloyd, B., Simpson, W.: Request for Comments 1334. PPP Authentication Protocols,
Network Working Group (October 1992)
[15] Quisquater, J.-J., Guillou, L.C., Berson, T.A.: How to Explain Zero-Knowledge
Protocols to Your Children. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435,
pp. 628-631. Springer, Heidelberg (1990),
http://www.cs.wisc.edu/~mkowalcz/628.pdf
[16] Cryptographic Hash Function. Wikipedia, the free encyclopedia,
http://en.wikipedia.org/wiki/Cryptographic_hash_function
 
Search WWH ::




Custom Search