AbstractIn an open networking environment, a workstation usually needs to identify its legal users for providing its services. Kerberos provides an efficient approach whereby a trusted third-party authentication server is used to verify users' identities. However, Kerberos enforces the user to use strong cryptographic secret for user authentication, and hence is insecure from password guessing attacks if the user uses a weak password for convenience. In this paper, we focus on such an environment in which the users can use easy-to-remember passwords. In addition to password guessing attacks, perfect forward secrecy (PFS in short) is another important security consideration when designing an authentication and key distribution protocol. Base...
peer reviewedCurrently, the Simple Password-Based Encrypted Key Exchange (SPAKE2) protocol of Abdall...
Frequent key changes are must in order to limit the amount of data compromised. Cryp-tography simply...
Since Kerberos suffers from KDC (Key Distribution Center) compromise and impersonation attack, a mul...
AbstractIn an open networking environment, a workstation usually needs to identify its legal users f...
[[abstract]]In an open networking environment, a workstation usually needs to identify its legal use...
Today millions of ordinary citizens are using networks for banking, shopping and filing their tax re...
Users are normally authenticated via their passwords in computer systems. Since people tend to choos...
[[abstract]]Password-based mechanism is the widely used method for authentication since it allows pe...
International audiencePassword-Authenticated Key Exchange allows users to generate a strong cryptogr...
As one of the most important trusted third-party-based authentication protocols, Kerberos is widely ...
Passwords have become the most ubiquitous form of client-server authentication on the Internet nowad...
Key exchange protocols allow two or more parties communicating over a public network to establish a ...
Perfect Forward Secrecy (PFS) is vital in contemporary authenticated key exchange (AKE) protocols. T...
A roaming user, who accesses a network from different client terminals, can be supported by a creden...
[[abstract]]It is a crucial that password security be effective and constantly improved. The three-p...
peer reviewedCurrently, the Simple Password-Based Encrypted Key Exchange (SPAKE2) protocol of Abdall...
Frequent key changes are must in order to limit the amount of data compromised. Cryp-tography simply...
Since Kerberos suffers from KDC (Key Distribution Center) compromise and impersonation attack, a mul...
AbstractIn an open networking environment, a workstation usually needs to identify its legal users f...
[[abstract]]In an open networking environment, a workstation usually needs to identify its legal use...
Today millions of ordinary citizens are using networks for banking, shopping and filing their tax re...
Users are normally authenticated via their passwords in computer systems. Since people tend to choos...
[[abstract]]Password-based mechanism is the widely used method for authentication since it allows pe...
International audiencePassword-Authenticated Key Exchange allows users to generate a strong cryptogr...
As one of the most important trusted third-party-based authentication protocols, Kerberos is widely ...
Passwords have become the most ubiquitous form of client-server authentication on the Internet nowad...
Key exchange protocols allow two or more parties communicating over a public network to establish a ...
Perfect Forward Secrecy (PFS) is vital in contemporary authenticated key exchange (AKE) protocols. T...
A roaming user, who accesses a network from different client terminals, can be supported by a creden...
[[abstract]]It is a crucial that password security be effective and constantly improved. The three-p...
peer reviewedCurrently, the Simple Password-Based Encrypted Key Exchange (SPAKE2) protocol of Abdall...
Frequent key changes are must in order to limit the amount of data compromised. Cryp-tography simply...
Since Kerberos suffers from KDC (Key Distribution Center) compromise and impersonation attack, a mul...