Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | 심경아 | - |
dc.date.accessioned | 2016-08-28T11:08:01Z | - |
dc.date.available | 2016-08-28T11:08:01Z | - |
dc.date.issued | 2005 | - |
dc.identifier.isbn | 3540308490 | - |
dc.identifier.isbn | 9783540308492 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.other | OAK-3139 | - |
dc.identifier.uri | https://dspace.ewha.ac.kr/handle/2015.oak/219663 | - |
dc.description.abstract | Recently, there have been proposed a number of password-authenticated key agreement protocols for two-party setting or three-party setting. In this paper, we show that recently proposed three password-authenticated key agreement protocols in [11, 12, 10] are insecure against several active attacks including a stolen-verifier attack, an off-line password guessing attack and impersonation attacks. © Springer-Verlag Berlin Heidelberg 2005. | - |
dc.language | English | - |
dc.title | Security analysis of password-authenticated key agreement protocols | - |
dc.type | Conference Paper | - |
dc.relation.volume | 3810 LNCS | - |
dc.relation.index | SCOPUS | - |
dc.relation.startpage | 49 | - |
dc.relation.lastpage | 58 | - |
dc.relation.journaltitle | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | - |
dc.identifier.doi | 10.1007/11599371_5 | - |
dc.identifier.wosid | WOS:000234848600005 | - |
dc.identifier.scopusid | 2-s2.0-33744793206 | - |
dc.author.google | Shim K.-A. | - |
dc.author.google | Seo S.-H. | - |
dc.date.modifydate | 20200911081002 | - |