View : 554 Download: 0

Full metadata record

DC Field Value Language
dc.contributor.author심경아-
dc.date.accessioned2016-08-28T11:08:01Z-
dc.date.available2016-08-28T11:08:01Z-
dc.date.issued2005-
dc.identifier.isbn3540308490-
dc.identifier.isbn9783540308492-
dc.identifier.issn0302-9743-
dc.identifier.otherOAK-3139-
dc.identifier.urihttps://dspace.ewha.ac.kr/handle/2015.oak/219663-
dc.description.abstractRecently, there have been proposed a number of password-authenticated key agreement protocols for two-party setting or three-party setting. In this paper, we show that recently proposed three password-authenticated key agreement protocols in [11, 12, 10] are insecure against several active attacks including a stolen-verifier attack, an off-line password guessing attack and impersonation attacks. © Springer-Verlag Berlin Heidelberg 2005.-
dc.languageEnglish-
dc.titleSecurity analysis of password-authenticated key agreement protocols-
dc.typeConference Paper-
dc.relation.volume3810 LNCS-
dc.relation.indexSCOPUS-
dc.relation.startpage49-
dc.relation.lastpage58-
dc.relation.journaltitleLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)-
dc.identifier.doi10.1007/11599371_5-
dc.identifier.wosidWOS:000234848600005-
dc.identifier.scopusid2-s2.0-33744793206-
dc.author.googleShim K.-A.-
dc.author.googleSeo S.-H.-
dc.date.modifydate20200911081002-
Appears in Collections:
자연과학대학 > 수학전공 > Journal papers
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

BROWSE