Filters








716 Hits in 9.0 sec

Strong password-only authenticated key exchange

David P. Jablon
<span title="1996-10-01">1996</span> <i title="Association for Computing Machinery (ACM)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/g4bof3rzarbpjigq5zxjkozv2u" style="color: black;">Computer communication review</a> </i> &nbsp;
It belongs to an exclusive class of methods which provide authentication and key establishment over an insecure channel using only a small password, without risk of offline dictionary attack.  ...  We compare SPEKE to the closely-related Diffie-Hellman Encrypted Key Exchange [BM92], and review the potential threats and countermeasures in some detail.  ...  Passwords as private-keys in a public-key system would be wonderful, but the holder of the corresponding public-key is then in a position to perform dictionary attack --which defeats the purpose of a public-key  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/242896.242897">doi:10.1145/242896.242897</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ygywkbyjgfhgfgnghp5lf27mni">fatcat:ygywkbyjgfhgfgnghp5lf27mni</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170813082654/http://tnlandforms.us/cs494-cns01/speke.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f2/b6/f2b635d89549453bd455cb8ba7b097d1b5bbe74b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/242896.242897"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks [chapter]

Feng Zhu, Duncan S. Wong, Agnes H. Chan, Robbie Ye
<span title="">2002</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
In addition, it is secure against dictionary attacks.  ...  We assume that public key cryptographic operations such as Diffie-Hellman key exchange conducted over a large multiplicative group is too computationally intensive for a low-power client to implement.  ...  Protocols designed to provide mutual authentication and key exchange, while also secure against offline keyguessing attacks or the so-called offline dictionary attacks, are called Password Authenticated  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-45811-5_11">doi:10.1007/3-540-45811-5_11</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/fnpi7qqnnvg6dofpaoxwh53wxq">fatcat:fnpi7qqnnvg6dofpaoxwh53wxq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20040416201830/http://www.cs.cityu.edu.hk:80/~duncan/papers/02zhuetal_rsapake.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/8c/b0/8cb03dd66fd3259225af3f032700201725472689.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-45811-5_11"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks [chapter]

Emmanuel Bresson, Olivier Chevassut, David Pointcheval
<span title="">2002</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Group Diffie-Hellman schemes for password-based key exchange are designed to provide a pool of players communicating over a public network, and sharing just a human-memorable password, with a session key  ...  The fundamental security goal to achieve in this scenario is security against dictionary attacks. While solutions have been proposed to solve this problem no formal treatment has ever been suggested.  ...  dictionary attacks.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-36178-2_31">doi:10.1007/3-540-36178-2_31</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/62xsab3kmnadlmd2c6jo3hw2fe">fatcat:62xsab3kmnadlmd2c6jo3hw2fe</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20171025150358/https://core.ac.uk/download/pdf/20771073.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/8f/1a/8f1ac67240a3501da544a11831a271482a20c9db.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-36178-2_31"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Authenticated Key Exchange Secure against Dictionary Attacks [chapter]

Mihir Bellare, David Pointcheval, Phillip Rogaway
<span title="">2000</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
In Section 4 we de ne EKE2, which is essentially the pair of ows at the center of Bellovin and Merritt's Di e-Hellman based Encrypted Key Exchange protocol 6 .  ...  Then we prove correctness for the idea at the center of the Encrypted Key-Exchange EKE protocol of Bellovin and Merritt: we prove security, in an ideal-cipher model, of the two-ow protocol at the core  ...  Acknowledgments We thank Charlie Racko for extensive discussions on the subject of session-key exchange over the last ve y ears, and for his corrections to our earlier works.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-45539-6_11">doi:10.1007/3-540-45539-6_11</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7qqggp6yyzhf3oml7wfkic7p5i">fatcat:7qqggp6yyzhf3oml7wfkic7p5i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20060112150548/http://www-cse.ucsd.edu:80/users/mihir/papers/dict.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/91/3f/913f225fa75fdd0e084554ebbbf28afc651e56cb.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-45539-6_11"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Persistent Asymmetric Password-Based Key Exchange [article]

Shaoquan Jiang
<span title="2010-09-26">2010</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
In this case, one should not expect the protocol to be secure against an off-line dictionary attack since, otherwise, the protocol is in fact a secure password-only key exchange where the server also only  ...  Asymmetric password based key exchange is a key exchange protocol where a client and a server share a low entropic password while the server additionally owns a high entropic secret for a public key.  ...  However, neither of two protocols can prevent the new threat above because the password is encrypted under a server public key and can be adversely decrypted without a dictionary attack if the private  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1004.3037v2">arXiv:1004.3037v2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ldm2an6hozcwrczg6zfgynuj64">fatcat:ldm2an6hozcwrczg6zfgynuj64</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20171004104243/https://core.ac.uk/download/pdf/2118290.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ba/81/ba81e7ec74591f13c8f58fe2f950425888050a97.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1004.3037v2" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Provably authenticated group Diffie-Hellman key exchange

Emmanuel Bresson, Olivier Chevassut, David Pointcheval, Jean-Jacques Quisquater
<span title="">2001</span> <i title="ACM Press"> Proceedings of the 8th ACM conference on Computer and Communications Security - CCS &#39;01 </i> &nbsp;
Group Diffie-Hellman protocols for Authenticated Key Exchange (AKE) are designed to provide a pool of players with a shared secret key which may later be used, for example, to achieve multicast message  ...  In this paper, we present a security model for this problem and use it to precisely define AKE (with "implicit" authentication) as the fundamental goal, and the entity-authentication goal as well.  ...  In this model Bellare et al. considered Diffie-Hellman and encryption-based key exchange.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/502014.502018">doi:10.1145/502014.502018</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/nxjrht6a2bbixlmacproi5d4gy">fatcat:nxjrht6a2bbixlmacproi5d4gy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20050125092106/http://www.di.ens.fr/users/pointche/Documents/Papers/2001_cccsB.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d5/c9/d5c941b1895cf90da009e7ef5acfc1b552f9a215.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/502014.502018"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Provably authenticated group Diffie-Hellman key exchange

Emmanuel Bresson, Olivier Chevassut, David Pointcheval, Jean-Jacques Quisquater
<span title="">2001</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rau5643b7ncwvh74y6p64hntle" style="color: black;">Proceedings of the 8th ACM conference on Computer and Communications Security - CCS &#39;01</a> </i> &nbsp;
Group Diffie-Hellman protocols for Authenticated Key Exchange (AKE) are designed to provide a pool of players with a shared secret key which may later be used, for example, to achieve multicast message  ...  In this paper, we present a security model for this problem and use it to precisely define AKE (with "implicit" authentication) as the fundamental goal, and the entity-authentication goal as well.  ...  In this model Bellare et al. considered Diffie-Hellman and encryption-based key exchange.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/501983.502018">doi:10.1145/501983.502018</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ccs/BressonCPQ01.html">dblp:conf/ccs/BressonCPQ01</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/b6sa6dnomnbibkjrkwpny6wkxq">fatcat:b6sa6dnomnbibkjrkwpny6wkxq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20050125092106/http://www.di.ens.fr/users/pointche/Documents/Papers/2001_cccsB.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d5/c9/d5c941b1895cf90da009e7ef5acfc1b552f9a215.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/501983.502018"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

An Efficient and Leakage-Resilient RSA-Based Authenticated Key Exchange Protocol with Tight Security Reduction

S. SHIN, K. KOBARA, H. IMAI
<span title="2007-02-01">2007</span> <i title="Institute of Electronics, Information and Communications Engineers (IEICE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/x2mklbxoqjfvjdjrdybgo53sdm" style="color: black;">IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences</a> </i> &nbsp;
RSA). key words: authenticated key exchange, passwords, on-line and off-line dictionary attacks, RSA, leakage of stored secrets, efficiency, perfect forward secrecy  ...  Both mutual authentication and generation of session keys can be accomplished by an authenticated key exchange (AKE) protocol.  ...  Acknowledgements We would like to appreciate the anonymous reviewers' constructive comments and advices on this paper.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1093/ietfec/e90-a.2.474">doi:10.1093/ietfec/e90-a.2.474</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/khnyy2dcxfb6xed4geb4rerjma">fatcat:khnyy2dcxfb6xed4geb4rerjma</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170808221354/http://www.rcis.aist.go.jp/papers/2007/s-k-i-ieice2007.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/8c/aa/8caa9e3c21b0b87ca689439e820dc16c6fba26c3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1093/ietfec/e90-a.2.474"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

A Privacy-Preserving Solution for Proximity Tracing Avoiding Identifier Exchanging [article]

Francesco Buccafurri, Vincenzo De Angelis, Cecilia Labrini
<span title="2020-05-20">2020</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
In this paper, we propose a solution leveraging GPS to detect proximity, and Bluetooth only to improve accuracy, without enabling exchange of identifiers.  ...  Unfortunately, a number of security and privacy concerns exist in this kind of solutions, mainly due to the exchange of identifiers, while GPS-based solutions (inherently centralized) may suffer from threats  ...  Clearly, TSP or other entities must not be able to intercept the messages toward S. Therefore, the communication is encrypted by using the public key of S.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2005.10309v1">arXiv:2005.10309v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/fupjp3msdjfergohsz33r6dtau">fatcat:fupjp3msdjfergohsz33r6dtau</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200903163125/https://arxiv.org/pdf/2005.10309v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ab/39/ab39f4e385f2f862af6d9c5bbdecfa4a45d3b6a3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2005.10309v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Cryptanalysis of Microsoft's point-to-point tunneling protocol (PPTP)

Bruce Schneier, Mudge
<span title="">1998</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rau5643b7ncwvh74y6p64hntle" style="color: black;">Proceedings of the 5th ACM conference on Computer and communications security - CCS &#39;98</a> </i> &nbsp;
We show how to break both the challenge/response authentication protocol (Microsoft CHAP) and the RC4 encryption protocol (MPPE), as well as how to attack the control channel in Microsoft's implementation  ...  The Point-to-Point Tunneling Protocol (PPTP) is used to secure PPP connections over TCP/IP links. In this paper we analyze Microsoft's Windows NT implementation of PPTP.  ...  This configuration stage is thus entirely open to attack.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/288090.288119">doi:10.1145/288090.288119</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ccs/SchneierM98.html">dblp:conf/ccs/SchneierM98</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/tjtjodkg6jdknbgesntu6adrme">fatcat:tjtjodkg6jdknbgesntu6adrme</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20060320065550/http://fringe.davesource.com/Fringe/Hacking/Documents/Microsoft_PPTP.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/86/3a/863a68efb424cdd9c1c0b3255e18e925cc16cebb.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/288090.288119"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

A Protocol for Secure Public Instant Messaging [chapter]

Mohammad Mannan, Paul C. van Oorschot
<span title="">2006</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
In light of threats to existing IM networks, we present the Instant Messaging Key Exchange (IMKE) protocol as a step towards secure IM.  ...  Based on our implementation of IMKE using the Jabber protocol, we provide insights on how IMKE may be integrated with popular IM protocols.  ...  The first author is partly supported by a Public Safety and Emergency Preparedness Canada (PSEPC) scholarship.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/11889663_2">doi:10.1007/11889663_2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ssqgg6szrrgujk6ggxdfrvdy7a">fatcat:ssqgg6szrrgujk6ggxdfrvdy7a</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20070702160207/http://www.ccsl.carleton.ca/paper-archive/mmannan-fc-06.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f2/e9/f2e9df08ce8d8b774192b82e88d3ab9e4b867301.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/11889663_2"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Ransomware and the Legacy Crypto API [chapter]

Aurélien Palisse, Hélène Le Bouder, Jean-Louis Lanet, Colas Le Guernic, Axel Legay
<span title="">2017</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Ransomware are malicious software that encrypt their victim's data and only return the decryption key in exchange of a ransom.  ...  The second one intercept calls made to Microsoft's Cryptographic API. Both methods must be active before the attack takes place, and none is general enough to handle all ransomware.  ...  Acknowledgments The authors would like to thank Ronan Lashermes, Alexandre Gonzalvez and the anonymous reviewers for their valuable help and comments.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-54876-0_2">doi:10.1007/978-3-319-54876-0_2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vzm3t7mhuzedjo46chpgcp3ise">fatcat:vzm3t7mhuzedjo46chpgcp3ise</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180719064625/https://hal.inria.fr/hal-01388056/document" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/63/6a/636a648543ed730422dbb6678187e55e32091ce6.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-54876-0_2"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Secure communication mechanisms for GSM networks

Chi-Chun Lo, Yu-Jen Chen
<span title="">1999</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/lfjucyeexrd75hshl2cngz7doq" style="color: black;">IEEE transactions on consumer electronics</a> </i> &nbsp;
Hnwcllcr, because of the openness of wireless comlllunication.l, how to prutect the p riva cy between communicating pa rties is becoming a very important issue.  ...  In the pruposed architecture, we usc public-key cryptography for IHer authentic:ltioll and stream cipher fur message encryption and decryptioll.  ...  However, password is vulnerable under the dictionary attack by which an attacker can guess the password successfully. Public-key clyptography provides a means for preventing the guessing attack .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/30.809184">doi:10.1109/30.809184</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/qgxecc3xujgfje4zaoqzgzep3y">fatcat:qgxecc3xujgfje4zaoqzgzep3y</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170815153224/https://ir.nctu.edu.tw/bitstream/11536/30984/1/000084430500009.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/8e/8d/8e8db665a2e643363b19b777db8ed446ed68c749.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/30.809184"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Off-the-Record Instant Messaging for Group Conversation

Jiang Bian, Remzi Seker, Umit Topaloglu
<span title="">2007</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/shm2ezaidfhldft2fi4zk4nura" style="color: black;">2007 IEEE International Conference on Information Reuse and Integration</a> </i> &nbsp;
.), they do not provide end-to-end secrecy. Off-the-record (OTR) is a protocol which enables IM users to have private conversations over the open and insecure public Internet.  ...  There is a need for such a product that provides users an opportunity to meet in an IM-based, virtual, and encrypted chat room.  ...  Since the MAC keys are generated as a one-way hash over the encryption key, the attacker can use this knowledge to mount a "dictionary attack", although such an attack is computationally too expensive.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/iri.2007.4296601">doi:10.1109/iri.2007.4296601</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/iri/BianST07.html">dblp:conf/iri/BianST07</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/6v744mzqlbgzfls2d7sj52c3zu">fatcat:6v744mzqlbgzfls2d7sj52c3zu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20161220050317/https://www.researchgate.net/profile/Remzi_Seker/publication/4272374_Off-the-Record_Instant_Messaging_for_Group_Conversation/links/53fb51d30cf27c365cf09c8a.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/4b/ec/4bec7c7eb00578dc42c9d44885be17dfed48da50.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/iri.2007.4296601"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Authentication Issues in Multi-service Residential Access Networks [chapter]

Judith Rossebø, John Ronan, Kristian Walsh
<span title="">2003</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
This paper examines the authentication issues for the TORRENT system and presents a public key based authentication protocol for mutually authenticating the RG and the LAP.  ...  Adequate security measures are essential in order to secure access to the TORRENT system and services and for QoS provisioning to authorised users.  ...  ADSL modem authentication is at best, password based and open to dictionary attacks when the password is small or insufficiently random.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-39404-4_29">doi:10.1007/978-3-540-39404-4_29</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/s5wyezo3j5c43pxf56fadeskme">fatcat:s5wyezo3j5c43pxf56fadeskme</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170922003304/http://repository.wit.ie/651/1/2003_MMNS_Ronan_et_al_final.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/90/90/9090e4f80d419d9c862ec1282f285d6609ca7df0.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-39404-4_29"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 716 results