Strong password-only authenticated key exchange
ACM SIGCOMM Computer Communication Review
The Relationship Between Breaking the Diffie--Hellman Protocol and Computing Discrete Logarithms
SIAM Journal on Computing
Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme
ACM SIGOPS Operating Systems Review
Provably secure password-authenticated key exchange using Diffie-Hellman
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
New directions in cryptography
IEEE Transactions on Information Theory
Off-line password-guessing attack to Peyravian-Jeffries's remote user authentication protocol
Computer Communications
Security flaws of remote user access over insecure networks
Computer Communications
Security flaw of Hölbl et al.'s protocol
Computer Communications
An efficient k-anonymous localization technique for assistive environments
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
A simple and efficient key exchange scheme against the smart card loss problem
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Improvement of Hölbl et al. user authentication protocol and password change protocol
Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services
A novel mutual authentication scheme for USB storage devices
Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services
Various types of attacks and solutions regarding secure remote user access over insecure networks
ICCSA'06 Proceedings of the 6th international conference on Computational Science and Its Applications - Volume Part I
Hi-index | 0.24 |
Remote user authentication based on passwords over untrusted networks is the conventional method of authentication in the Internet and mobile communication environment. Typical secure remote user access solutions rely on pre-established secure cryptographic keys, public-key infrastructure, or secure hardware. In this paper, we present secure password-based protocols for remote user authentication, password change, and session key establishment over insecure networks. The proposed protocols do not require the use of any additional private- or public-key infrastructure.