Information Technology Reference
In-Depth Information
Acknowledgements
We would like to thank the anonymous reviewers for their helpful comments to
improve our manuscript. This research was supported by the MIC (Ministry of
Information and Communication), Korea, under the ITRC (Information Tech-
nology Research Center) support program supervised by the IITA (Institute of
Information Technology Assessment).
References
1. Peyravian, M., Zunic, N.: Methods for Protecting Password Transmission. Com-
puters & Security. Vol. 19. No. 5. (2000) 466-469
2. Hwang, J.J., Yeh, T.C.: Improvement on Peyravian-Zunic's Password Authentica-
tion Schemes. IEICE Transactions on Communications. Vol. E85-B. No. 4. (April
2002) 823-825
3. Lin, C.L., Hwang, T.: A Password Authentication Scheme with Secure Password
Updating. Computers & Security. Vol. 22. No. 1. (2003) 68-72
4. Yang. C.C., Chang. T.Y., Li, J.W.: Security Enhancement for Protecting Password
Transmission. IEICE Transactions on Communications. Vol. E86-B. No. 7. (July
2003) 2178-2181
5. Menezes, A.J., Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptograph.
CRC Press. New York. (1997)
6. Bellovin, S.M., Merritt, M.: Encrypted Key Exchange: Password based Protocols
Secure against Dictionary Attacks. In Proceedings 1992 IEEE Symposium on Re-
search in Security and Privacy. IEEE Computer Society. (1992) 72-84
7. Bellovin, S.M., Merritt, M.: Augmented Encrypted Key Exchange: A Password-
based Protocol Secure against Dictionary Attacks and Password File Compromise.
In Proceedings of the 1st ACM Conference on Computer and Communication
Security. (1993) 244-250
8. Boyko, V., MacKenzie, P., Patel, S.: Provably Secure Password-Authenticated Key
Exchange Using Die-Hellman. In Eurocrypt 2000. Springer-Verlag (LNCS 1807).
(2000) 156-171
9. Bellare, M., Poinycheval, D., Rogaway, P.: Authenticated Key Exchange Secure
against Dictionary Attacks. In Eurocrypt 2000. Springer-Verlag (LNCS 1807).
(2000) 139-155
10. Halevi, S., Krawczyk, H.: Public-Key Cryptography and Password Protocols. ACM
Transactions on information and system security. Vol. 2. No. 3. (1998) 230-268
11. Kobara, K., Imai, H.: Pretty-Simple Password-Authenticated Key-Exchage under
Standard Assumptions. IEICE Transactions on Fundamentals of Electronics, Com-
munications and Computer Sciences. Vol. E85-A, No. 10 (2002) 2229-2237
12. Gennaro, R., Lindell, Y.: A Framework for Password-based Authenticated Key
Exchange. In Eurocrypt 2003. Springer-Verlag (LNCS 2656). (2003) 524-543
Search WWH ::




Custom Search