Sciweavers

42 search results - page 1 / 9
» Combating Against Attacks on Encrypted Protocols
Sort
View
ICC
2007
IEEE
13 years 11 months ago
Combating Against Attacks on Encrypted Protocols
Zubair Md. Fadlullah, Tarik Taleb, Nirwan Ansari, ...
JDCTA
2010
150views more  JDCTA 2010»
12 years 11 months ago
Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both ...
Ang Gao
CTRSA
2006
Springer
140views Cryptology» more  CTRSA 2006»
13 years 8 months ago
Session Corruption Attack and Improvements on Encryption Based MT-Authenticators
Bellare, Canetti and Krawczyk proposed a security model (BCK-model) for authentication and key exchange protocols in 1998. The model not only reasonably captures the power of pract...
Xiaojian Tian, Duncan S. Wong
EUROCRYPT
2000
Springer
13 years 8 months ago
Authenticated Key Exchange Secure against Dictionary Attacks
Password-based protocols for authenticated key exchange (AKE) are designed to work despite the use of passwords drawn from a space so small that an adversary might well enumerate, ...
Mihir Bellare, David Pointcheval, Phillip Rogaway