Sciweavers

42 search results - page 1 / 9
» Combating Against Attacks on Encrypted Protocols
Sort
View
ICC
2007
IEEE
14 years 2 days ago
Combating Against Attacks on Encrypted Protocols
Zubair Md. Fadlullah, Tarik Taleb, Nirwan Ansari, ...
JDCTA
2010
150views more  JDCTA 2010»
13 years 17 days ago
Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both ...
Ang Gao
CTRSA
2006
Springer
140views Cryptology» more  CTRSA 2006»
13 years 9 months ago
Session Corruption Attack and Improvements on Encryption Based MT-Authenticators
Bellare, Canetti and Krawczyk proposed a security model (BCK-model) for authentication and key exchange protocols in 1998. The model not only reasonably captures the power of pract...
Xiaojian Tian, Duncan S. Wong
EUROCRYPT
2000
Springer
13 years 9 months ago
Authenticated Key Exchange Secure against Dictionary Attacks
Password-based protocols for authenticated key exchange (AKE) are designed to work despite the use of passwords drawn from a space so small that an adversary might well enumerate, ...
Mihir Bellare, David Pointcheval, Phillip Rogaway