Sciweavers

210 search results - page 12 / 42
» The Secure Remote Password Protocol
Sort
View
SACRYPT
2004
Springer
125views Cryptology» more  SACRYPT 2004»
15 years 2 months ago
Password Based Key Exchange with Mutual Authentication
A reasonably efficient password based key exchange (KE) protocol with provable security without random oracle was recently proposed by Katz, et al. [18] and later by Gennaro and Li...
Shaoquan Jiang, Guang Gong
EUROCRYPT
2003
Springer
15 years 2 months ago
A Framework for Password-Based Authenticated Key Exchange
Abstract. In this paper we present a general framework for passwordbased authenticated key exchange protocols, in the common reference odel. Our protocol is actually an abstraction...
Rosario Gennaro, Yehuda Lindell
CSI
2004
178views more  CSI 2004»
14 years 9 months ago
A flexible biometrics remote user authentication scheme
Recently, Lee, Ryu and Yoo proposed a fingerprint-based remote user authentication scheme by using smart cards and biometrics. Their scheme is based on two tiers of ElGamal's...
Chu-Hsing Lin, Yi-Yi Lai
106
Voted
CSFW
2008
IEEE
14 years 11 months ago
Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus
We present a general technique for modeling remote electronic voting protocols in the applied pi-calculus and for automatically verifying their security. In the first part of this...
Michael Backes, Catalin Hritcu, Matteo Maffei
JDCTA
2010
150views more  JDCTA 2010»
14 years 4 months ago
Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both ...
Ang Gao