Sciweavers

JCSS
2006
102views more  JCSS 2006»
13 years 11 months ago
Password-based authentication and key distribution protocols with perfect forward secrecy
In an open networking environment, a workstation usually needs to identify its legal users for providing its services. Kerberos provides an efficient approach whereby a trusted th...
Hung-Min Sun, Her-Tyan Yeh
CCS
1993
ACM
14 years 3 months ago
On Simple and Secure Key Distribution
Many recent research e orts in computer security focus on constructing provably secure authentication protocols. Although many of the resulting protocols rely on the a priori secu...
Gene Tsudik, Els Van Herreweghen
SRDS
1993
IEEE
14 years 3 months ago
Some Remarks on Protecting Weak Keys and Poorly-Chosen Secrets from Guessing Attacks
Authentication and key distribution protocols that utilize weak secrets (such as passwords and PINs) are traditionally susceptible to guessing attacks whereby an adversary iterate...
Gene Tsudik, Els Van Herreweghen
SPW
1997
Springer
14 years 3 months ago
Protocols Using Anonymous Connections: Mobile Applications
This paper describes security protocols that use anonymous channels as primitive, much in the way that key distribution protocols ryption as primitive. This abstraction allows us t...
Michael G. Reed, Paul F. Syverson, David M. Goldsc...
ACISP
2001
Springer
14 years 3 months ago
On Classifying Conference Key Distribution Protocols
In this paper, we examine a classification of conference key distribution protocols proposed in [4] and show that no known protocol satisfies the security requirements in class 4...
Shahrokh Saeednia, Reihaneh Safavi-Naini, Willy Su...