Author:
Wang Xiangyang,Gu Chunxiang,Lu Siqi,Chen Xi
Reference21 articles.
1. Protecting poorly chosen secrets from guessing attacks
2. Public-key cryptography and password protocols
3. Key Exchange Using Passwords and Long Keys;Kolesnikov;Proc. TCC. LNCS 3876,2006
4. On the resilience of key agreement protocols to key compromise impersonation;Strangio;Proc. EuroPKI. LNCS,2006
5. Cross-Realm Password-Based Server Aided Key Exchange;Yoneyama;Proc. WISA. LNCS,2010