Analysis of the Blocking Probability for Wireless PKI |
Shin Seung-Soo
(동명정보대학교 정보보호학과)
Choi Seung Kwon (충북대학교 전기전자컴퓨터공학부) Ji Hong-Il (충북대학교 전기전자컴퓨터공학부) Shin Dong-Hwa (충북대학교 전기전자컴퓨터공학부) Cho Yong-Hwan (충북대학교 전기전자컴퓨터공학부) |
1 | V.Boyko, P. Mackenzie, and S. Patel, 'Probably Secure Password-Authenticated Key Exchange Using Diffie-heIlman,' advances in Cryptology-EUROCRYPT' 2000, pp. 156-171, 2000 |
2 | M.Bellare, D. Pointcheval, and P. Rogaway, 'Authenticated Key Exchange Secure Against Dictionary Attacks,' advances in Cryptology-EUROCRYPT' 2000, pp.139-155, 2000 DOI ScienceOn |
3 | Thomas Wu, 'The Secure Remote Password Protocol', Internet Society Symp., Network and Distributed Systems Security Symposium, 1998, pp. 97-111 |
4 | . Kwon, and J. Song, 'A Study on the Generalized Agreement and Password Authentication Protocol,' IEICE TRANS. COMMUN., Vol. E83-B, No.9, pp 2044-2050, SEP 2000 |
5 | Sufatrio, K. Lam, 'Mobile IP Registration Protocol : A Security Attack and New Secure Minimal Public-Key Based Authentication,' I-SPAN'99, June 1999 DOI |
6 | R. Anderson and T. Lomas, 'Fortifying Key negotiation schemes with poorly chosen passwords,' Electronics Letters, 1994, Vol. 30, No. 13 DOI ScienceOn |
7 | M. Myers, R. Ankney, A. Malpani, S. Galperin, and C. Adams, Internet X.509 Public Key Infrastructure On-line Certificate Status Protocol-OCSP,' RFC2560, 1999 |
8 | S. Bellovin and M. Merritt, Augmented Encrypted Key Exchange', in Proceedings of the First ACM Conference on Computer and Communication Security, pp. 244-250, 193 DOI |