Secure Remote Password protocol

Results: 21



#Item
1Computing / Cryptography / Network architecture / Internet protocols / Cryptographic protocols / Secure communication / Hypertext Transfer Protocol / World Wide Web / Transport Layer Security / Secure Remote Password protocol / Communications protocol / HTTPS

PLACES’10 The 3rd Workshop on Programming Language Approaches to Concurrency and Communication-Centric Software

Add to Reading List

Source URL: places10.di.fc.ul.pt

Language: English - Date: 2010-12-07 19:00:11
2Computer access control / Computer network security / Statistical classification / Support vector machine / Password / Cryptographic nonce / Private biometrics / Authentication protocol / Challengeresponse authentication / Authentication / Biometrics / Man-in-the-middle attack

Secure remote matching with privacy: Scrambled Support Vector Vaulted Verification (S 2 V 3 ) Michael J. Wilber and Terrance E. Boult Vision and Security Technology Lab, UCCS Colorado Springs, CO, 80918, USA {mwilber,tbo

Add to Reading List

Source URL: www.vast.uccs.edu

Language: English - Date: 2012-02-11 13:31:30
3Computer access control / Computer network security / Statistical classification / Support vector machine / Password / Cryptographic nonce / Private biometrics / Authentication protocol / Challengeresponse authentication / Authentication / Biometrics / Man-in-the-middle attack

Secure remote matching with privacy: Scrambled Support Vector Vaulted Verification (S 2 V 3 ) Michael J. Wilber and Terrance E. Boult Vision and Security Technology Lab, UCCS Colorado Springs, CO, 80918, USA {mwilber,tbo

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2012-02-11 13:31:30
4Computer security / Password / SPEKE / Salt / Key-agreement protocol / Replay attack / Password-authenticated key agreement / Secure Remote Password protocol / Cryptographic protocols / Cryptography / Security

Authentication and Key Agreement via Memorable Password Taekyoung Kwon Abstract them, the knowledge-based scheme is aimed for

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2001-07-20 00:20:35
5IEEE P1363 / SPEKE / Secure Remote Password protocol / Encrypted key exchange / Password / PKCS / Key-agreement protocol / Key exchange / Elliptic curve cryptography / Cryptography / Cryptographic protocols / Password-authenticated key agreement

PDF Document

Add to Reading List

Source URL: grouper.ieee.org

Language: English - Date: 2008-04-27 09:53:57
6Diffie–Hellman key exchange / RSA / XTR / Password / Key / Secure Remote Password protocol / Password-authenticated key agreement / Cryptography / Cryptographic protocols / SPEKE

Secure Sessions from Weak Secrets Michael Roe1 Bruce Christianson2 David Wheeler3 1

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2010-08-20 09:24:39
7Computing / Password-authenticated key agreement / Diffie–Hellman key exchange / XTR / Diffie–Hellman problem / File Transfer Protocol / Password / Password Authenticated Key Exchange by Juggling / Secure Remote Password protocol / Cryptographic protocols / Cryptography / Data

A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol ? SeongHan Shin1 , Kazukuni Kobara1 , and Hideki Imai2,1 1 Research Center for Information Security (RCIS),

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-21 19:36:43
8Public-key cryptography / Password authentication protocol / Key-agreement protocol / Password / Secure Remote Password protocol / Cryptographic protocols / Cryptography / Encrypted key exchange

A weakness in Sun-Chen-Hwang’s three-party key agreement protocols using passwords ? Junghyun Nam, Seungjoo Kim, Dongho Won, School of Information and Communication Engineering, Sungkyunkwan University, 300 Cheoncheon-

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-13 20:50:57
9Diffie–Hellman key exchange / Key-agreement protocol / Advantage / Diffie–Hellman problem / Cryptographic nonce / Adversary model / SPEKE / Secure Remote Password protocol / Cryptography / Cryptographic protocols / Random oracle

A preliminary version appears in ISC 2009, Lecture Notes in Computer Science, Springer-Verlag, 2009. This version is dated December 18, 2009. Security Analysis of the PACE Key-Agreement Protocol Jens Bender1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-18 06:37:52
10Secure communication / Security / Internet protocols / Internet standards / HTTP / Transport Layer Security / HTTP Secure / Password / Secure Remote Password protocol / Cryptography / Cryptographic protocols / Computing

Crypton: Zero-Knowledge Application Framework Cam Pedersen David Dahl Engineer, Crypton

Add to Reading List

Source URL: crypton.io

Language: English - Date: 2014-11-11 16:05:14
UPDATE