1 |
S. Bellovin, and M.merritt, 'Encrypted Key Exchange: Password-Based Protocols Secure against Dictionary Attacks,' Proc. of the Symposium on Security and Privacy, IEEE Computer Society, pp. 72-84, 1992
DOI
|
2 |
J. Munilla, and A. Peinado, 'Off-line passwordguessing attack to Peyravian-Jeffries's remote user authentication protocol,' Computer Communications, Vol. 30, No. 1, pp. 52-54, 2006
DOI
ScienceOn
|
3 |
M. Peyravian, and C. Jeffries, 'Secure remote user access over insecure networks,' Computer Communications, Vol. 29, No. 5, pp. 660-667, 2006
DOI
ScienceOn
|
4 |
J. Munilla, and A. Peinado, 'Security flaw of H lbl et al.'s protocol,' Computer Communications, Vol. 32, No. 4, pp. 736-739, 2009
DOI
ScienceOn
|
5 |
M. H lbl, T. Welzer, and B. Brumen, 'Improvement of the Peyravian-Jefferies's user authentication protocol and password change protocol', Computer Communications, Vol. 31, No. 10, pp. 1945-1951, 2008
DOI
ScienceOn
|
6 |
K. A. Shim, 'Security flaws of remote user access over insecure networks,' Computer Communications, Vol. 30, No. 1, pp. 117-121, 2006
DOI
ScienceOn
|
7 |
W. Diffie, and M. Hellman, 'New directions in cryptography,' IEEE Transactions on Information Theory, Vol. 22, No. 6, pp. 644-654, 1976
DOI
|