View : 809 Download: 0

Full metadata record

DC Field Value Language
dc.contributor.author심경아-
dc.date.accessioned2016-08-28T12:08:43Z-
dc.date.available2016-08-28T12:08:43Z-
dc.date.issued2007-
dc.identifier.issn0920-5489-
dc.identifier.otherOAK-4084-
dc.identifier.urihttps://dspace.ewha.ac.kr/handle/2015.oak/219869-
dc.description.abstractIn this paper we point out potential weaknesses of AuthA protocols which are in the process of being standardized by IEEE; IEEE P1363-Password-based authentication and key agreement protocols. More precisely, we present chosen protocol attacks on AuthA password-authenticated key agreement protocols. We make suggestions for improvement. © 2007 Elsevier B.V. All rights reserved.-
dc.languageEnglish-
dc.titlePotential weaknesses of AuthA password-authenticated key agreement protocols-
dc.typeArticle-
dc.relation.issue5-
dc.relation.volume29-
dc.relation.indexSCIE-
dc.relation.indexSCOPUS-
dc.relation.startpage580-
dc.relation.lastpage583-
dc.relation.journaltitleComputer Standards and Interfaces-
dc.identifier.doi10.1016/j.csi.2007.01.002-
dc.identifier.wosidWOS:000247526100009-
dc.identifier.scopusid2-s2.0-34248679874-
dc.author.googleShim K.-A.-
dc.date.modifydate20200911081002-
Appears in Collections:
자연과학대학 > 수학전공 > Journal papers
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

BROWSE