1 |
S. M. Bellovin and M. Merrit, 'Encrypted key exchange: Password-based protocols secure against dictionary attacks,' Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 72-84, 1992
|
2 |
Y. Ding and P. Horster, 'Undetectable on-line password guessing attacks,' ACM Operating Systems Review, vol. 29, no. 4, pp. 77-86, 1995
DOI
ScienceOn
|
3 |
C. Lin, H. Sun, and T. Hwang, 'Threeparty encrypted key exchange: Attacks and a solution,' ACM Operating Systems Review, vol. 34, no. 4, pp. 12-20, 2000
DOI
|
4 |
C. Lin, H. Sun, M. Steiner, and T. Hwang, 'Three-party Encrypted Key Exchange Without Server Public Keys,' IEEE Communication Letters, vol. 5, no. 12, pp. 497-499, 2001
DOI
ScienceOn
|
5 |
C. Chang and Y. Chang, 'A novel three-party encrypted key exchange protocol,' Computer Standards & Interfaces, vol. 26, no. 5, pp. 471-476, 2004
DOI
ScienceOn
|
6 |
H. Sun, B. Chen, and T. Hwang, 'Secure key agreement protocols for three-party against guessing attacks,' The Journal of Systems and Software, vol. 75, no. 1-2, pp. 63-68, 2005
DOI
ScienceOn
|
7 |
M. Steiner, G. Tsudik, and M. Waidner, 'Refinement and extension of Encrypted Key Exchange,' ACM Operating Systems Review, vol. 29, no. 3, pp. 22-30, 1995
DOI
ScienceOn
|