Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | 심경아 | - |
dc.date.accessioned | 2016-08-28T12:08:34Z | - |
dc.date.available | 2016-08-28T12:08:34Z | - |
dc.date.issued | 2006 | - |
dc.identifier.issn | 0140-3664 | - |
dc.identifier.other | OAK-3727 | - |
dc.identifier.uri | https://dspace.ewha.ac.kr/handle/2015.oak/219791 | - |
dc.description.abstract | Remote user authentication based on passwords over untrusted networks is the conventional method of authentication in the Internet and mobile communication environments. Typical secure remote user access solutions rely on pre-established secure cryptographic keys, public-key infrastructure, or secure hardware. Recently, Peyravian and Jeffries proposed password-based protocols for remote user authentication, password change, and session key establishment over insecure networks without requiring any additional private- or public-key infrastructure. In this paper we point out security flaws of Peyravian-Jeffries's protocols against off-line password guessing attacks and Denial-of-Service attacks. © 2006 Elsevier B.V. All rights reserved. | - |
dc.language | English | - |
dc.title | Security flaws of remote user access over insecure networks | - |
dc.type | Article | - |
dc.relation.issue | 1 | - |
dc.relation.volume | 30 | - |
dc.relation.index | SCIE | - |
dc.relation.index | SCOPUS | - |
dc.relation.startpage | 117 | - |
dc.relation.lastpage | 121 | - |
dc.relation.journaltitle | Computer Communications | - |
dc.identifier.doi | 10.1016/j.comcom.2006.08.001 | - |
dc.identifier.wosid | WOS:000242988300012 | - |
dc.identifier.scopusid | 2-s2.0-33751177550 | - |
dc.author.google | Shim K.-A. | - |
dc.date.modifydate | 20200911081002 | - |