1. S. Bellovin and M. Merritt "Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password-file compromise " in Proceedings of the ACM Conference on Computer and Communications Security pp. 244--250 1993. 10.1145/168588.168618 S. Bellovin and M. Merritt "Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password-file compromise " in Proceedings of the ACM Conference on Computer and Communications Security pp. 244--250 1993. 10.1145/168588.168618
2. Stolen-verifier attack on two new strong-password authentication protocols;Chen C. M.;IEICE Transactions on Communications,2002
3. L. Gong "Optimal authentication protocols resistant to password guessing attacks " in Proceedings of the 8th IEEE Computer Security Foundation Workshop pp. 24--29 1995. L. Gong "Optimal authentication protocols resistant to password guessing attacks " in Proceedings of the 8th IEEE Computer Security Foundation Workshop pp. 24--29 1995.
4. N. M. Hailer "The S/KEY (TM) one-time password system " in Proceedings of the Internet Society Symposium on Network and Distributed System Security pp. 151--158 1994. N. M. Hailer "The S/KEY (TM) one-time password system " in Proceedings of the Internet Society Symposium on Network and Distributed System Security pp. 151--158 1994.
5. Reparable key distribution protocols for Internet environments