Sciweavers

17 search results - page 2 / 4
» Proofs for Two-Server Password Authentication
Sort
View
ICMCS
2005
IEEE
296views Multimedia» more  ICMCS 2005»
13 years 11 months ago
An Association-Based Graphical Password Design Resistant to Shoulder-Surfing Attack
In line with the recent call for technology on Image Based Authentication (IBA) in JPEG committee [1], we present a novel graphical password design in this paper. It rests on the ...
Zhi Li, Qibin Sun, Yong Lian, Daniele D. Giusto
TCOS
2010
13 years 1 days ago
J-PAKE: Authenticated Key Exchange without PKI
Password Authenticated Key Exchange (PAKE) is one of the important topics in cryptography. It aims to address a practical security problem: how to establish secure communication be...
Feng Hao, Peter Ryan
NDSS
1998
IEEE
13 years 9 months ago
The Secure Remote Password Protocol
This paper presents a new password authentication and key-exchange protocol suitable for authenticating users and exchanging keys over an untrusted network. The new protocol resis...
Thomas D. Wu
EUROCRYPT
2000
Springer
13 years 9 months ago
Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman
Abstract. When designing password-authenticated key exchange protocols (as opposed to key exchange protocols authenticated using cryptographically secure keys), one must not allow ...
Victor Boyko, Philip D. MacKenzie, Sarvar Patel
JOC
2007
133views more  JOC 2007»
13 years 5 months ago
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication
In the security chain the weakest link is definitely the human one: human beings cannot remember long secrets and often resort to rather insecure solutions to keep track of their ...
Dario Catalano, David Pointcheval, Thomas Pornin