Author:
Chang Chin-Chen,Chang Ya-Fen
Subject
Law,Hardware and Architecture,Software
Reference13 articles.
1. Encrypted key exchange: password-based protocols secure against dictionary attacks;Bellovin,1992
2. Password security: a case history;Morris;Communications of the ACM,1979
3. Refinement and extension of encrypted key exchange;Steiner;ACM Operating Systems Review,1995
4. Undetectable on-line password guessing attacks;Ding;ACM Operating Systems Review,1995
5. Three-party encrypted key exchange: attacks and a solution;Lin;ACM Operating Systems Review,2000
Cited by
57 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献