On the Security of Methods for Protecting Password Transmission (original) (raw)
Related papers
A Novel Password Protected Key Exchange Protocol
Santosh Naidu, P R SANTOSH NAIDU CSE, JNTUK UCEV
Improvement of the Peyravian-Jeffries's user authentication protocol and password change protocol
Computer Communications, 2008
Improvements on two password-based authentication protocols
2009
A Non-Exchanged Password Scheme for Password-Based Authentication in Client-Server Systems
Hussein Al-Bahadili, Shakir Hussain
American Journal of Applied Sciences
A Practical Password-Based Two-Server Authentication and Key Exchange System
IEEE Transactions on Dependable and Secure Computing, 2006
Password authentication with insecure communication
Robust and secure password and key change method
Journal of Computer Security, 1996
An Efficient Authentication Scheme
International Journal for Infonomics, 2011
Secure Password Sharing and Storage using Encryption and Key-Exchange
International Journal of Computer Applications, 2021
An Enhanced Password Authentication Scheme Providing Password Updating without Smart Cards
Multimedia and Ubiquitous Engineering, 2007
Attack and Improvement of the Secure Password Authentication Protocol in Wireless Networks
Advanced Materials Research, 2011
A Password-Based Authenticator: Security Proof and Applications
Lecture Notes in Computer Science, 2003
Securing Authentication Passwords in Unencrypted Communications with Obligatory Unique Salts
Far East Journal of Electronics and Communications, 2018
A Password-Based Key Establishment Protocol with Symmetric Key Cryptography
2008
An efficient client–client password-based authentication scheme with provable security
Secure Password Authentication Scheme by using Cryptographic Key Exchange in Servers
Secure Password Authentication Scheme by using Cryptographic Key Exchange in Servers, 2017
Efficient Password-Authenticated Key Exchange Based on RSA
Lecture Notes in Computer Science, 2006
An enhanced password authenticated key exchange protocol without server public keys
2012 International Conference on ICT Convergence (ICTC), 2012
Secure Data Protection in Insecure Networks using One Time Password based Encryption
International Journal of Engineering Research and, 2015
A Method for Making Password-Based Key Exchange Resilient to Server Compromise
2006
On the Security of Some Password-Based Key Agreement Schemes
Lecture Notes in Computer Science, 2005
Weaknesses and Improvements of Yang-Chang-Hwang's Password Authentication Scheme
Informatica (lithuanian Academy of Sciences), 2005
IJERT-Secure Data Protection in Insecure Networks using One Time Password based Encryption
International Journal of Engineering Research and Technology (IJERT), 2015
A Protected Single Sign-On Technique Using 2D Password in Distributed Computer Networks
Efficient Password Scheme Without Trusted Server
International Journal of Aviation Technology, Engineering and Management, 2011
The N/R one time password system
2005
Intensifying the Authentication Schemes ToFortify the Network Security: A Survey
2014
Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions
Topics in Cryptology - CT-RSA 2016, 2016
A Secure and Efficient Two-Server Password Only Authenticated Key Exchange
IOSR Journal of Computer Engineering, 2014
A Critical appraisal on Password based Authentication
International Journal of Computer Network and Information Security
Journal of Cryptology, 1989