Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | 심경아 | - |
dc.date.accessioned | 2016-08-28T12:08:43Z | - |
dc.date.available | 2016-08-28T12:08:43Z | - |
dc.date.issued | 2007 | - |
dc.identifier.issn | 0920-5489 | - |
dc.identifier.other | OAK-4084 | - |
dc.identifier.uri | https://dspace.ewha.ac.kr/handle/2015.oak/219869 | - |
dc.description.abstract | In this paper we point out potential weaknesses of AuthA protocols which are in the process of being standardized by IEEE; IEEE P1363-Password-based authentication and key agreement protocols. More precisely, we present chosen protocol attacks on AuthA password-authenticated key agreement protocols. We make suggestions for improvement. © 2007 Elsevier B.V. All rights reserved. | - |
dc.language | English | - |
dc.title | Potential weaknesses of AuthA password-authenticated key agreement protocols | - |
dc.type | Article | - |
dc.relation.issue | 5 | - |
dc.relation.volume | 29 | - |
dc.relation.index | SCIE | - |
dc.relation.index | SCOPUS | - |
dc.relation.startpage | 580 | - |
dc.relation.lastpage | 583 | - |
dc.relation.journaltitle | Computer Standards and Interfaces | - |
dc.identifier.doi | 10.1016/j.csi.2007.01.002 | - |
dc.identifier.wosid | WOS:000247526100009 | - |
dc.identifier.scopusid | 2-s2.0-34248679874 | - |
dc.author.google | Shim K.-A. | - |
dc.date.modifydate | 20200911081002 | - |