Efficient and timely mutual authentication
ACM SIGOPS Operating Systems Review
Reducing risks from poorly chosen keys
SOSP '89 Proceedings of the twelfth ACM symposium on Operating systems principles
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Undetectable on-line password guessing attacks
ACM SIGOPS Operating Systems Review
Timestamps in key distribution protocols
Communications of the ACM
Password security: a case history
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
A Modular Approach to Key Distribution
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Optimal authentication protocols resistant to password guessing attacks
CSFW '95 Proceedings of the 8th IEEE workshop on Computer Security Foundations
Efficient and practical DHEKE protocols
ACM SIGOPS Operating Systems Review
Three-party encrypted key exchange: attacks and a solution
ACM SIGOPS Operating Systems Review
Simple authenticated key agreement protocol resistant to password guessing attacks
ACM SIGOPS Operating Systems Review
Password-based user authentication and key distribution protocols for client-server applications
Journal of Systems and Software
Secure key agreement protocols for three-party against guessing attacks
Journal of Systems and Software - Special issue: Software engineering education and training
Password-based authentication and key distribution protocols with perfect forward secrecy
Journal of Computer and System Sciences
Communication-efficient AUTHMAC_DH protocols
Computer Standards & Interfaces
Communication-efficient three-party protocols for authentication and key agreement
Computers & Mathematics with Applications
Password authenticated key exchange protocols among diverse network domains
Computers and Electrical Engineering
Token-based authenticated key establishment protocols for three-party communication
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Secure password authentication for keystroke dynamics
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
Tutorial: Efficient and secure password-based authentication protocols against guessing attacks
Computer Communications
Hi-index | 0.00 |
In this paper, we propose a new authentication and key distribution protocol which is adaptable and reliable for communication networks. The secrets for authentication, which are chosen from a relatively small space by common users, are easy to guess. Our protocol gives a solution to protect the weak secrets from guessing attacks.Compared with other related work, our protocol is more reliable because it is resistant to various kinds of attacks including guessing attacks, and more adaptable because it reduces several overheads which make the existing protocols more expensive. We show how to apply our protocol to the Q.931 calling sequences and to the World Wide Web model.