AbstractIn an open networking environment, a workstation usually needs to identify its legal users for providing its services. Kerberos provides an efficient approach whereby a trusted third-party authentication server is used to verify users' identities. However, Kerberos enforces the user to use strong cryptographic secret for user authentication, and hence is insecure from password guessing attacks if the user uses a weak password for convenience. In this paper, we focus on such an environment in which the users can use easy-to-remember passwords. In addition to password guessing attacks, perfect forward secrecy (PFS in short) is another important security consideration when designing an authentication and key distribution protocol. Base...
Abstract. Password-only authenticated key exchange (PAKE) protocols are designed to be secure even w...
Perfect Forward Secrecy (PFS) is vital in contemporary authenticated key exchange (AKE) protocols. T...
Graduation date: 2007Authentication protocols play important roles in network security. A variety of...
[[abstract]]In an open networking environment, a workstation usually needs to identify its legal use...
AbstractIn an open networking environment, a workstation usually needs to identify its legal users f...
Today millions of ordinary citizens are using networks for banking, shopping and filing their tax re...
Users are normally authenticated via their passwords in computer systems. Since people tend to choos...
As one of the most important trusted third-party-based authentication protocols, Kerberos is widely ...
A roaming user, who accesses a network from different client terminals, can be supported by a creden...
Passwords have become the most ubiquitous form of client-server authentication on the Internet nowad...
Password-based authentication is the most popular authentication mechanism for humans today, not onl...
[[abstract]]Password-based mechanism is the widely used method for authentication since it allows pe...
[[abstract]]Due to the rapid growth of technology, it is impossible to store all information in a si...
[[abstract]]Kerberos is a well-known network authentication mechanism. Based upon Kerberos' model, S...
International audiencePassword-Authenticated Key Exchange allows users to generate a strong cryptogr...
Abstract. Password-only authenticated key exchange (PAKE) protocols are designed to be secure even w...
Perfect Forward Secrecy (PFS) is vital in contemporary authenticated key exchange (AKE) protocols. T...
Graduation date: 2007Authentication protocols play important roles in network security. A variety of...
[[abstract]]In an open networking environment, a workstation usually needs to identify its legal use...
AbstractIn an open networking environment, a workstation usually needs to identify its legal users f...
Today millions of ordinary citizens are using networks for banking, shopping and filing their tax re...
Users are normally authenticated via their passwords in computer systems. Since people tend to choos...
As one of the most important trusted third-party-based authentication protocols, Kerberos is widely ...
A roaming user, who accesses a network from different client terminals, can be supported by a creden...
Passwords have become the most ubiquitous form of client-server authentication on the Internet nowad...
Password-based authentication is the most popular authentication mechanism for humans today, not onl...
[[abstract]]Password-based mechanism is the widely used method for authentication since it allows pe...
[[abstract]]Due to the rapid growth of technology, it is impossible to store all information in a si...
[[abstract]]Kerberos is a well-known network authentication mechanism. Based upon Kerberos' model, S...
International audiencePassword-Authenticated Key Exchange allows users to generate a strong cryptogr...
Abstract. Password-only authenticated key exchange (PAKE) protocols are designed to be secure even w...
Perfect Forward Secrecy (PFS) is vital in contemporary authenticated key exchange (AKE) protocols. T...
Graduation date: 2007Authentication protocols play important roles in network security. A variety of...