Author:
Sun Hung-Min,Chen Bing-Chang,Hwang Tzonelih
Subject
Hardware and Architecture,Information Systems,Software
Reference15 articles.
1. Bellovin, S.M., Merritt, M., 1992. Encrypted key exchange: password-based protocols secure against dictionary attacks. In: Proceedings of the 1992 IEEE Computer Society Conference on Research in Security and Privacy, pp. 72–84
2. Bellovin, S.M., Merritt, M., 1994. Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise. Technical report, AT&T Bell Laboratories
3. New directions in cryptography;Diffie;IEEEE Transactions on Information Theory,1976
4. Gong, L., 1995. Optimal authentication protocols resistant to password guessing attacks. In: Proceedings of the 8th IEEE Computer Security Foundation Workshop, County Kerry, Ireland, June, pp. 24–29
5. Protecting poorly chosen secrets from guessing attacks;Gong;IEEE Journal on Selected Areas in Communications,1993
Cited by
65 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献