|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1427 occurrences of 503 keywords
|
|
|
Results
Found 3269 publication records. Showing 3269 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
190 | Michael Luby, Charles Rackoff |
A Study of Password Security. |
CRYPTO |
1987 |
DBLP DOI BibTeX RDF |
|
114 | Joseph Chee Ming Teo, Chik How Tan |
Denial-of-service resilience password-based group key agreement for wireless networks. |
Q2SWinet |
2007 |
DBLP DOI BibTeX RDF |
denial-of-service, group key agreement, secure group communication, password-based authentication |
111 | IkSu Park, Seung Bae Park, ByeongKyun Oh |
User Authentication Protocol Based on Human Memorable Password and Using RSA. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
Password Dictionary, Authentication, Cryptography, public key cryptography, Password authentication |
111 | IkSu Park, Seung Bae Park, ByeongKyun Oh |
User Authentication Protocol Based on Human Memorable Password and Using RSA. |
ICCSA (4) |
2004 |
DBLP DOI BibTeX RDF |
Password Dictionary, Authentication, Cryptography, public key cryptography, Password authentication |
109 | Jae Hyung Koo, Dong Hoon Lee 0001 |
Secure Password Pocket for Distributed Web Services. |
NPC |
2005 |
DBLP DOI BibTeX RDF |
|
101 | Philip Inglesant, Martina Angela Sasse |
The true cost of unusable password policies: password use in the wild. |
CHI |
2010 |
DBLP DOI BibTeX RDF |
password policy, passwords, usable security |
101 | Yong Ho Hwang, Dae Hyun Yum, Pil Joong Lee |
EPA: An Efficient Password-Based Protocal for Authenticated Key Exchange. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
101 | J. Archer Harris |
OPA: A One-Time Password System. |
ICPP Workshops |
2002 |
DBLP DOI BibTeX RDF |
|
98 | Michel Abdalla, Pierre-Alain Fouque, David Pointcheval |
Password-Based Authenticated Key Exchange in the Three-Party Setting. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Password, key distribution, authenticated key exchange, multi-party protocols |
93 | Umut Topkara, Mikhail J. Atallah, Mercan Topkara |
Passwords decay, words endure: secure and re-usable multiple password mnemonics. |
SAC |
2007 |
DBLP DOI BibTeX RDF |
mnemonic sentence, usability, authentication, natural language processing, passwords |
91 | Shirley Gaw, Edward W. Felten |
Password management strategies for online accounts. |
SOUPS |
2006 |
DBLP DOI BibTeX RDF |
password reuse, security, survey, password, user behavior, password management |
91 | David P. Jablon |
Extended Password Key Exchange Protocols Immune to Dictionary Attacks. |
WETICE |
1997 |
DBLP DOI BibTeX RDF |
extended password key exchange protocols, stored password-verifier, Simple Password Exponential Key Exchange, intranet use, Internet, Internet, authentication, dictionary attack |
91 | Susan Wiedenbeck, Jim Waters, Jean-Camille Birget, Alex Brodskiy, Nasir D. Memon |
Authentication using graphical passwords: effects of tolerance and image choice. |
SOUPS |
2005 |
DBLP DOI BibTeX RDF |
PassPoints, password images, authentication, human factors, usable security, tolerance, graphical passwords, password security |
88 | Khaled Alghathbar, Hanan A. Mahmoud |
Noisy password scheme: A new one time password system. |
CCECE |
2009 |
DBLP DOI BibTeX RDF |
|
86 | Paul C. van Oorschot, Julie Thorpe |
On predictive models and user-drawn graphical passwords. |
ACM Trans. Inf. Syst. Secur. |
2008 |
DBLP DOI BibTeX RDF |
Draw-a-Secret, graphical dictionary, memorable passwords, modeling user choice, password complexity factors, Graphical passwords, dictionary attack |
86 | Youngsook Lee, Junghyun Nam, Dongho Won |
An Inter-domain Key Agreement Protocol Using Weak Passwords. |
ICCSA (3) |
2006 |
DBLP DOI BibTeX RDF |
authentication, password, Key exchange, public key |
84 | Huanyu Zhao, Xiaolin Li 0001 |
S3PAS: A Scalable Shoulder-Surfing Resistant Textual-Graphical Password Authentication Scheme. |
AINA Workshops (2) |
2007 |
DBLP DOI BibTeX RDF |
|
83 | Saeed Rajput, Jihong Chen, Sam Hsu |
State based authentication. |
ACM Southeast Regional Conference (2) |
2005 |
DBLP DOI BibTeX RDF |
rule-based attack, syllable attack, security, authentication, access control, attack, password, help-desk, vulnerabilities, dictionary attack, unauthorized access, password management |
81 | Philip D. MacKenzie, Thomas Shrimpton, Markus Jakobsson |
Threshold Password-Authenticated Key Exchange. |
J. Cryptol. |
2006 |
DBLP DOI BibTeX RDF |
Key exchange, Password authentication, Dictionary attack, Threshold cryptosystems |
80 | Ronald Pose |
Password-Capabilities: Their Evolution from the Password-Capability System into Walnut and Beyond. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
78 | Yanjiang Yang, Robert H. Deng, Feng Bao 0001 |
A Practical Password-Based Two-Server Authentication and Key Exchange System. |
IEEE Trans. Dependable Secur. Comput. |
2006 |
DBLP DOI BibTeX RDF |
Password system, password verification data (PVD), offline dictionary attack, key exchange, user authentication |
78 | Eun-Jun Yoon, Kee-Young Yoo |
A New Simple Authenticated Key Agreement and Protected Password Change Protocol. |
EUC Workshops |
2005 |
DBLP DOI BibTeX RDF |
Password change, Dffie-Hellman key agreement, Authentication, Cryptography, Password, Key agreement |
78 | Ya-Fen Chang, Chin-Chen Chang 0001 |
A secure and efficient strong-password authentication protocol. |
ACM SIGOPS Oper. Syst. Rev. |
2004 |
DBLP DOI BibTeX RDF |
strong password, smart card, password authentication, mutual authentication, denial-of-service attack, stolen-verifier attack |
76 | Timothy W. van der Horst, Kent E. Seamons |
pwdArmor: Protecting Conventional Password-Based Authentications. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
76 | Eun-Ser Lee, Haeng-Kon Kim, Sang Ho Lee 0004 |
Design of the Intelligence User Identification Method for the Improved Password Input Method and the Personality Security. |
KES (2) |
2007 |
DBLP DOI BibTeX RDF |
|
76 | Angelo Ciaramella, Paolo D'Arco, Alfredo De Santis, Clemente Galdi, Roberto Tagliaferri |
Neural Network Techniques for Proactive Password Checking. |
IEEE Trans. Dependable Secur. Comput. |
2006 |
DBLP DOI BibTeX RDF |
neural networks, machine learning, access control, passwords, System security |
76 | Sang Jun Lee, SeungBae Park |
Mobile Password System for Enhancing Usability-Guaranteed Security in Mobile Phone Banking. |
Human.Society@Internet |
2005 |
DBLP DOI BibTeX RDF |
|
73 | Richard Shay, Elisa Bertino |
A comprehensive simulation tool for the analysis of password policies. |
Int. J. Inf. Sec. |
2009 |
DBLP DOI BibTeX RDF |
Simulation, Management, Policy, Password |
73 | Hua Wang, Yao Guo 0001, Xia Zhao, Xiangqun Chen |
Keep Passwords Away from Memory: Password Caching and Verification Using TPM. |
AINA |
2008 |
DBLP DOI BibTeX RDF |
OIAP, Password Authentication, TPM |
73 | Richard Shay, Abhilasha Bhargav-Spantzel, Elisa Bertino |
Password policy simulation and analysis. |
Digital Identity Management |
2007 |
DBLP DOI BibTeX RDF |
simulation, modeling, management, policy, password |
73 | Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, Bodo Möller, David Pointcheval |
Provably secure password-based authentication in TLS. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
encrypted key exchange, password authentication, TLS |
73 | Michael Szydlo, Burton S. Kaliski Jr. |
Proofs for Two-Server Password Authentication. |
CT-RSA |
2005 |
DBLP DOI BibTeX RDF |
concrete security reduction, secret sharing, password authentication |
73 | Xunhua Wang, Mohammad Hossain Heydari, Hua Lin |
An Intrusion-Tolerant Password Authentication System. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
off-line dictionary attack, password-authenticated key exchange (PAKE), Intrusion tolerance |
70 | Manu Kumar, Tal Garfinkel, Dan Boneh, Terry Winograd |
Reducing shoulder-surfing by using gaze-based password entry. |
SOUPS |
2007 |
DBLP DOI BibTeX RDF |
gaze-based password entry, password entry, eye tracking, shoulder surfing |
70 | Francesco Bergadano, Bruno Crispo, Giancarlo Ruffo |
High Dictionary Compression for Proactive Password Checking. |
ACM Trans. Inf. Syst. Secur. |
1998 |
DBLP DOI BibTeX RDF |
password selection, access control, decision trees, proactive password checking |
68 | Lukasz Chmielewski, Jaap-Henk Hoepman, Peter van Rossum |
Client-Server Password Recovery. |
OTM Conferences (2) |
2009 |
DBLP DOI BibTeX RDF |
|
68 | Dengguo Feng, Weidong Chen |
Modular approach to the design and analysis of password-based security protocols. |
Sci. China Ser. F Inf. Sci. |
2007 |
DBLP DOI BibTeX RDF |
weak computational indistinguishability, random oracle model (ROM), provable security, security protocols, standard model |
68 | Hyunsoo Song, Taekyoung Kwon 0002 |
Security Analysis of Secure Password Authentication for Keystroke Dynamics. |
KES (1) |
2006 |
DBLP DOI BibTeX RDF |
|
68 | Philip D. MacKenzie, Thomas Shrimpton, Markus Jakobsson |
Threshold Password-Authenticated Key Exchange. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
68 | Victor Boyko, Philip D. MacKenzie, Sarvar Patel |
Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman. |
EUROCRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
65 | Markus Jakobsson, Steven A. Myers |
Delayed password disclosure. |
SIGACT News |
2007 |
DBLP DOI BibTeX RDF |
decisional, doppelganger, static diffie-hellman, user interfaces, phishing, oblivious transfer, password authenticated key exchange |
65 | Markus Jakobsson, Steven A. Myers |
Delayed password disclosure. |
Digital Identity Management |
2007 |
DBLP DOI BibTeX RDF |
decisional & static diffie-hellman assumption, user interfaces, authentication, phishing, oblivious transfer, password authenticated key exchange |
65 | Youngsook Lee, Junghyun Nam, Jin Kwak, Dongho Won |
Password-Only Authenticated Key Exchange Between Two Agents in the Four-Party Setting. |
KES-AMSTA |
2007 |
DBLP DOI BibTeX RDF |
authentication, agent, Password, key exchange, inter-domain |
65 | Susan Wiedenbeck, Jim Waters, Leonardo Sobrado, Jean-Camille Birget |
Design and evaluation of a shoulder-surfing resistant graphical password scheme. |
AVI |
2006 |
DBLP DOI BibTeX RDF |
convex hull click scheme, authentication, usable security, graphical passwords, shoulder-surfing, password security |
65 | Craig Gentry, Philip D. MacKenzie, Zulfikar Ramzan |
Password authenticated key exchange using hidden smooth subgroups. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
authentication, cryptography, password, key exchange |
65 | Hea Suk Jo, Hee Yong Youn |
A Secure User Authentication Protocol Based on One-Time-Password for Home Network. |
ICCSA (1) |
2005 |
DBLP DOI BibTeX RDF |
three-way handshake, security, Authentication, home network, one-time password |
65 | Michel Abdalla, David Pointcheval |
Simple Password-Based Encrypted Key Exchange Protocols. |
CT-RSA |
2005 |
DBLP DOI BibTeX RDF |
encrypted key exchange, Password, Diffie-Hellman assumptions |
65 | Yvonne Hitchcock, Yiu Shing Terry Tin, Juan Manuel González Nieto, Colin Boyd, Paul Montague |
A Password-Based Authenticator: Security Proof and Applications. |
INDOCRYPT |
2003 |
DBLP DOI BibTeX RDF |
key agreement, password authentication, Key management protocols |
62 | Jin Wook Byun, Dong Hoon Lee 0001, Jongin Lim 0001 |
Efficient and Provably Secure Client-to-Client Password-Based Key Exchange Protocol. |
APWeb |
2006 |
DBLP DOI BibTeX RDF |
Human memorable password, different password authentication, mobile computing, dictionary attacks, authenticated key exchange |
62 | Wei-Chi Ku |
A hash-based strong-password authentication scheme without using smart cards. |
ACM SIGOPS Oper. Syst. Rev. |
2004 |
DBLP DOI BibTeX RDF |
password-file compromise attack, strong password, user authentication, replay attack, denial-of-service attack |
62 | Sarvar Patel |
Number Theoretic Attacks on Secure Password Schemes. |
S&P |
1997 |
DBLP DOI BibTeX RDF |
number theoretic attacks, secure password schemes, Encrypted Key Exchange, EKE, authenticated information exchange, insecure network, secret key cryptography, randomized confounders, RSA version, half encrypted versions, Direct Authentication Protocol, Secret Public Key Protocol versions, secure protocols, message authentication, dictionary attacks, active attacks, password guessing attacks |
62 | Dan Mossop, Ronald Pose |
Information Leakage and Capability Forgery in a Capability-Based Operating System Kernel. |
OTM Workshops (1) |
2006 |
DBLP DOI BibTeX RDF |
Password-capabilities, access control, security analysis |
62 | Michel Abdalla, Olivier Chevassut, Pierre-Alain Fouque, David Pointcheval |
A Simple Threshold Authenticated Key Exchange from Short Secrets. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
Threshold Protocols, Password-based Authentication |
60 | Matt Weir, Sudhir Aggarwal, Breno de Medeiros, Bill Glodek |
Password Cracking Using Probabilistic Context-Free Grammars. |
SP |
2009 |
DBLP DOI BibTeX RDF |
|
60 | Ran Canetti, Shai Halevi, Michael Steiner 0001 |
Mitigating Dictionary Attacks on Password-Protected Local Storage. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
|
60 | Seung Wook Jung, Souhwan Jung |
Secure Password Authentication for Distributed Computing. |
CIS |
2006 |
DBLP DOI BibTeX RDF |
|
60 | Frances F. Yao, Yiqun Lisa Yin |
Design and Analysis of Password-Based Key Derivation Functions. |
IEEE Trans. Inf. Theory |
2005 |
DBLP DOI BibTeX RDF |
|
60 | Jonathan Katz, Philip D. MacKenzie, Gelareh Taban, Virgil D. Gligor |
Two-Server Password-Only Authenticated Key Exchange. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
60 | Frances F. Yao, Yiqun Lisa Yin |
Design and Analysis of Password-Based Key Derivation Functions. |
CT-RSA |
2005 |
DBLP DOI BibTeX RDF |
|
60 | Sundararaman Jeyaraman, Umut Topkara |
Have the cake and eat it too - Infusing usability into text-password based authentication systems. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
60 | Muxiang Zhang |
New Approaches to Password Authenticated Key Exchange Based on RSA. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
60 | Muxiang Zhang |
Further Analysis of Password Authenticated Key Exchange Protocol Based on RSA for Imbalanced Wireless Networks. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
60 | Art Conklin, Glenn B. Dietrich, Diane B. Walz |
Password-Based Authentication: A System Perspective. |
HICSS |
2004 |
DBLP DOI BibTeX RDF |
|
60 | Mario Di Raimondo, Rosario Gennaro |
Provably Secure Threshold Password-Authenticated Key Exchange. |
EUROCRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
57 | Sonia Chiasson, Alain Forget, Elizabeth Stobert, Paul C. van Oorschot, Robert Biddle |
Multiple password interference in text passwords and click-based graphical passwords. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
multiple password interference, authentication, usable security, graphical passwords |
57 | Xun Yi, Raylin Tso, Eiji Okamoto |
ID-Based Group Password-Authenticated Key Exchange. |
IWSEC |
2009 |
DBLP DOI BibTeX RDF |
protocol compiler, common reference model, group key agreement, Password-authenticated key exchange |
57 | Shuhua Wu, Yuefei Zhu |
Constant-Round Password-Based Authenticated Key Exchange Protocol for Dynamic Groups. |
Financial Cryptography |
2008 |
DBLP DOI BibTeX RDF |
provably secure, key exchange, password authenticated, dynamic group |
57 | Karthik Nandakumar, Abhishek Nagar, Anil K. Jain 0001 |
Hardening Fingerprint Fuzzy Vault Using Password. |
ICB |
2007 |
DBLP DOI BibTeX RDF |
Biometric template security, hardening, helper data, fingerprint, password, minutiae, fuzzy vault |
57 | Michel Abdalla, David Pointcheval |
Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication. |
Financial Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Password-based authentication, multi-party protocols, Diffie-Hellman assumptions |
57 | Sanggon Lee, Yvonne Hitchcock, Youngho Park 0005, Sang-Jae Moon |
Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves. |
Selected Areas in Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Tripartite key agreement, bilinear Diffie-Hellman problem, Joux’s protocol, provable security, password-based authentication |
57 | Kee-Won Kim, Jun-Cheol Jeon, Kee-Young Yoo |
Efficient and Secure Password Authentication Schemes for Low-Power Devices. |
MSN |
2005 |
DBLP DOI BibTeX RDF |
low-power device, wireless network, password authentication, mutual authentication |
57 | Eun-Jun Yoon, Kee-Young Yoo |
An Efficient Password Authentication Schemes Without Using the Server Public Key for Grid Computing. |
GCC |
2005 |
DBLP DOI BibTeX RDF |
Security, Grid computing, Password authentication |
57 | Horng-Twu Liaw, Shiou-Wei Fan, Wei-Chen Wu |
A simple password authentication using a polynomial. |
ACM SIGOPS Oper. Syst. Rev. |
2004 |
DBLP DOI BibTeX RDF |
security, authentication, password |
57 | Shuhong Wang 0001, Jie Wang 0038, Maozhi Xu |
Weaknesses of a Password-Authenticated Key Exchange Protocol between Clients with Different Passwords. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
Cross-realm setting, Security, Dictionary attacks, Password-authenticated key exchange |
57 | Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi |
A Novel Approach to Proactive Password Checking. |
InfraSec |
2002 |
DBLP DOI BibTeX RDF |
Neural Network, Access Control, Data Security, Perceptron, Proactive Password Checking |
57 | Jin Wook Byun, Ik Rae Jeong, Dong Hoon Lee 0001, Chang-Seop Park |
Password-Authenticated Key Exchange between Clients with Different Passwords. |
ICICS |
2002 |
DBLP DOI BibTeX RDF |
key exchange, Password authentication, dictionary attack, Kerberos, cross-realm |
57 | Cheryl V. Hinds, Chinedu Ekwueme |
Increasing security and usability of computer systems with graphical passwords. |
ACM Southeast Regional Conference |
2007 |
DBLP DOI BibTeX RDF |
usability, graphical passwords |
57 | Iuon-Chang Lin, Hsia-Hung Ou, Min-Shiang Hwang |
A user authentication system using back-propagation network. |
Neural Comput. Appl. |
2005 |
DBLP DOI BibTeX RDF |
Neural network, Information security, User authentication, One-way hash function, Back-propagation network |
57 | Jae-Woo Lee |
Security Agent Model Using Interactive Authentication Database. |
AIS |
2004 |
DBLP DOI BibTeX RDF |
|
57 | Jae-Woo Lee |
Client Authentication Model Using Duplicated Authentication Server Systems. |
AIS |
2004 |
DBLP DOI BibTeX RDF |
|
57 | Julie Thorpe, Paul C. van Oorschot |
Towards Secure Design Choices for Implementing Graphical Passwords. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
54 | Kazuki Yoneyama |
Efficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract). |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
password-based key exchange, password-based server aided key exchange, leakage of internal states, undetectable on-line dictionary attack |
54 | Junghyun Nam, Sangchul Han, Minkyu Park, Juryon Paik, Ung-Mo Kim |
Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords. |
ICCSA (2) |
2009 |
DBLP DOI BibTeX RDF |
undetectable on-line dictionary attack, Group key exchange, password-based authentication |
52 | Xavier Boyen |
Hidden credential retrieval from a reusable password. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
online authentication, partially trusted servers, reusable passwords, stateless roaming credentials |
52 | Kemal Bicakci, Nart Bedin Atalay, Mustafa Yuceel, Hakan Gurbaslar, Burak Erdeniz |
Towards Usable Solutions to Graphical Password Hotspot Problem. |
COMPSAC (2) |
2009 |
DBLP DOI BibTeX RDF |
|
52 | Shouhong Wang, Hai Wang 0008 |
Password Authentication Using Hopfield Neural Networks. |
IEEE Trans. Syst. Man Cybern. Part C |
2008 |
DBLP DOI BibTeX RDF |
|
52 | Victor K. Y. Wu, Roy H. Campbell |
Password Streaming for RFID Privacy. |
OTM Workshops |
2008 |
DBLP DOI BibTeX RDF |
|
52 | Yoginder S. Dandass |
Using FPGAs to Parallelize Dictionary Attacks for Password Cracking. |
HICSS |
2008 |
DBLP DOI BibTeX RDF |
|
52 | Dario Catalano, David Pointcheval, Thomas Pornin |
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication. |
J. Cryptol. |
2007 |
DBLP DOI BibTeX RDF |
|
52 | Gang Yao, Dengguo Feng, Xiaoxi Han |
Improved Client-to-Client Password-Authenticated Key Exchange Protocol. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
52 | Debasis Giri, Parmeshwary Dayal Srivastava |
Cryptanalysis and the Improvement of Kim et al.'s Password Authentication Schemes. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
Authentication, Smart card, Attack, Timestamp, Nonce |
52 | Xiaoyuan Suo, Ying Zhu 0001, G. Scott Owen |
Analysis and Design of Graphical Password Techniques. |
ISVC (2) |
2006 |
DBLP DOI BibTeX RDF |
|
52 | YeongGeun Choe, Soon-Ja Kim |
Secure Password Authentication for Keystroke Dynamics. |
KES (3) |
2005 |
DBLP DOI BibTeX RDF |
|
52 | Sung-Woon Lee, Woo-Hun Kim, Hyun-Sung Kim 0001, Kee-Young Yoo |
Efficient Password-Based Authenticated Key Agreement Protocol. |
ICCSA (4) |
2004 |
DBLP DOI BibTeX RDF |
|
52 | David C. Feldmeier, Philip R. Karn |
UNIX Password Security - Ten Years Later. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
49 | Masayuki Fukumitsu, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata |
A Proposal of an Associating Image-Based Password Creating Method and a Development of a Password Creating Support System. |
AINA |
2010 |
DBLP DOI BibTeX RDF |
associating image-based password, authentication, password |
49 | Zhiguo Wan, Robert H. Deng, Feng Bao 0001, Bart Preneel, Ming Gu 0001 |
n PAKE+: A Tree-Based Group Password-Authenticated Key Exchange Protocol Using Different Passwords. |
J. Comput. Sci. Technol. |
2009 |
DBLP DOI BibTeX RDF |
security protocol, group key agreement, password-authenticated key exchange |
49 | Wenting Jin, Jing Xu 0002 |
An Efficient and Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol with Smart Cards. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
Password-authenticated key agreement, Client-to-client, Smart cards, Provable security, Cross-realm |
49 | Fuw-Yi Yang, Tzung-Da Wu, Ming-Huei Hsu |
Improvement of Hölbl et al. user authentication protocol and password change protocol. |
iiWAS |
2009 |
DBLP DOI BibTeX RDF |
Diffie-Hellmen, hash functions, password, remote authentication |
49 | Guomin Li, Dake He, Wei Guo |
Password-Based Tripartite Key Exchange Protocol with Forward Secrecy. |
RSKT |
2008 |
DBLP DOI BibTeX RDF |
Password-based tripartite authenticated key exchange, Known key attacks, Forward secrecy |
Displaying result #1 - #100 of 3269 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|