[[abstract]]Designing authenticated key exchange protocols for portable devices to secure communications is an emerging issue. Recently, Wen et al. proposed two provably secure authenticated key exchange protocols for low power computing devices. However, we show that the first protocol is vulnerable to the replay attack, while the second one is subject to the generic man-in-the-middle attack. Besides, both protocols are susceptible to the modification attack as well as the user impersonation attack. Based on the underline reasons of such successful attacks, we extend their protocols to defend such attacks.[[notice]]補正完畢[[journaltype]]國外[[incitationindex]]EI[[booktype]]紙本[[countrycodes]]JP
In large-scale client-client communication environments, Password-Authenticated Key Exchange (PAKE) ...
A fundamental problem in security is authentication: namely, how to verify the identity of another p...
Abstract—Remote user authentication always adopts the method of password to login the server within ...
In this work we consider two protocols for performing cryptanalysis and security enhancement. The fi...
Abstract. In this work we consider two protocols for performing crypt-analysis and security enhancem...
[[abstract]]In 1998, Chang and Wu proposed a group-oriented authentication mechanism with key exchan...
[[abstract]]Remote authentication is an essential part of the rapid-growing electronic commerce. Rec...
In 2002, Zhu et al. proposed a password authenticated key exchange protocol based on RSA such that i...
Key exchange protocols allow two or more parties communicating over a public network to establish a ...
Abstract: In 2003, Wu and Chieu proposed a user friendly remote authentication scheme using smart ca...
With the advancement in Internet-based technologies, network applications are no longer just limited...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
[[abstract]]How to develop an efficient and secure authentication protocol has been a hot research t...
In this paper, we present attacks on two improved key distribution protocol with perfect reparabilit...
[[abstract]]Recently, Zhu et al. proposed an password-based authenticated key exchange protocol base...
In large-scale client-client communication environments, Password-Authenticated Key Exchange (PAKE) ...
A fundamental problem in security is authentication: namely, how to verify the identity of another p...
Abstract—Remote user authentication always adopts the method of password to login the server within ...
In this work we consider two protocols for performing cryptanalysis and security enhancement. The fi...
Abstract. In this work we consider two protocols for performing crypt-analysis and security enhancem...
[[abstract]]In 1998, Chang and Wu proposed a group-oriented authentication mechanism with key exchan...
[[abstract]]Remote authentication is an essential part of the rapid-growing electronic commerce. Rec...
In 2002, Zhu et al. proposed a password authenticated key exchange protocol based on RSA such that i...
Key exchange protocols allow two or more parties communicating over a public network to establish a ...
Abstract: In 2003, Wu and Chieu proposed a user friendly remote authentication scheme using smart ca...
With the advancement in Internet-based technologies, network applications are no longer just limited...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
[[abstract]]How to develop an efficient and secure authentication protocol has been a hot research t...
In this paper, we present attacks on two improved key distribution protocol with perfect reparabilit...
[[abstract]]Recently, Zhu et al. proposed an password-based authenticated key exchange protocol base...
In large-scale client-client communication environments, Password-Authenticated Key Exchange (PAKE) ...
A fundamental problem in security is authentication: namely, how to verify the identity of another p...
Abstract—Remote user authentication always adopts the method of password to login the server within ...