[[abstract]]Password authentication is the most important and convenient protocol for verifying users to get the system's resources. Lin et al. had proposed an optimal strongpassword authentication protocol (OSPA) which is a onetime password method. It can protect against the replaying attacks, impersonation attacks, and denial of service attacks. However, the authors shall show that the OSPA protocol is vulnerable to the guessing attacks in this paper
It is a well known fact that user-chosen passwords are somewhat predictable: by using tools such as ...
Brute force and dictionary attacks on password-only remote login services are now widespread and eve...
In 2002, Zhu et al. proposed a password authenticated key exchange protocol based on RSA such that i...
Password authentication, which is widely used for authenticated method, also is important protocol b...
[[abstract]]Password authentication, which is widely used for authenticated method, also is impor-ta...
[[abstract]]A password-based mechanism is the most widely used method of authentication in distribut...
Users are normally authenticated via their passwords in computer systems. Since people tend to choos...
Recently, Liao et al. and Hölbl et al. each proposed a user authentication protocol, respectively. B...
In 2003, Lin et al. proposed an enhanced protocol of optimal strong-password authentication protocol...
password-based practical authentication scheme using one-way collision-resistant hash functions. How...
[[abstract]]In 2006, Lu and Cao proposed an off-line password guessing attack on an efficient key ag...
We discuss a password-based authentication protocol that we argue to be robust against password-gues...
Passwords are our primary form of authentication. Yet passwords are a major vulnerability for compu...
Abstract—Remote user authentication always adopts the method of password to login the server within ...
[[abstract]]Three-party key exchange protocol is one of the most essential cryptographic technique i...
It is a well known fact that user-chosen passwords are somewhat predictable: by using tools such as ...
Brute force and dictionary attacks on password-only remote login services are now widespread and eve...
In 2002, Zhu et al. proposed a password authenticated key exchange protocol based on RSA such that i...
Password authentication, which is widely used for authenticated method, also is important protocol b...
[[abstract]]Password authentication, which is widely used for authenticated method, also is impor-ta...
[[abstract]]A password-based mechanism is the most widely used method of authentication in distribut...
Users are normally authenticated via their passwords in computer systems. Since people tend to choos...
Recently, Liao et al. and Hölbl et al. each proposed a user authentication protocol, respectively. B...
In 2003, Lin et al. proposed an enhanced protocol of optimal strong-password authentication protocol...
password-based practical authentication scheme using one-way collision-resistant hash functions. How...
[[abstract]]In 2006, Lu and Cao proposed an off-line password guessing attack on an efficient key ag...
We discuss a password-based authentication protocol that we argue to be robust against password-gues...
Passwords are our primary form of authentication. Yet passwords are a major vulnerability for compu...
Abstract—Remote user authentication always adopts the method of password to login the server within ...
[[abstract]]Three-party key exchange protocol is one of the most essential cryptographic technique i...
It is a well known fact that user-chosen passwords are somewhat predictable: by using tools such as ...
Brute force and dictionary attacks on password-only remote login services are now widespread and eve...
In 2002, Zhu et al. proposed a password authenticated key exchange protocol based on RSA such that i...