On the Security of Methods for Protecting Password Transmission (original) (raw)

A Novel Password Protected Key Exchange Protocol

Santosh Naidu, P R SANTOSH NAIDU CSE, JNTUK UCEV

View PDFchevron_right

Improvement of the Peyravian-Jeffries's user authentication protocol and password change protocol

Marko Hölbl, Tatjana Welzer

Computer Communications, 2008

View PDFchevron_right

Improvements on two password-based authentication protocols

周志賢 資訊管理學系-

2009

View PDFchevron_right

A Non-Exchanged Password Scheme for Password-Based Authentication in Client-Server Systems

Hussein Al-Bahadili, Shakir Hussain

American Journal of Applied Sciences

View PDFchevron_right

A Practical Password-Based Two-Server Authentication and Key Exchange System

Yanjiang Yang

IEEE Transactions on Dependable and Secure Computing, 2006

View PDFchevron_right

Password authentication with insecure communication

zaid alsulami

View PDFchevron_right

Robust and secure password and key change method

Refik Molva

Journal of Computer Security, 1996

View PDFchevron_right

An Efficient Authentication Scheme

Sattar Aboud

International Journal for Infonomics, 2011

View PDFchevron_right

Secure Password Sharing and Storage using Encryption and Key-Exchange

Andrew M. Kahonge

International Journal of Computer Applications, 2021

View PDFchevron_right

An Enhanced Password Authentication Scheme Providing Password Updating without Smart Cards

Hao-Chuan Tsai

Multimedia and Ubiquitous Engineering, 2007

View PDFchevron_right

Attack and Improvement of the Secure Password Authentication Protocol in Wireless Networks

Yung-Cheng Lee

Advanced Materials Research, 2011

View PDFchevron_right

A Password-Based Authenticator: Security Proof and Applications

Juan Manuel

Lecture Notes in Computer Science, 2003

View PDFchevron_right

Securing Authentication Passwords in Unencrypted Communications with Obligatory Unique Salts

Radek Němec

Far East Journal of Electronics and Communications, 2018

View PDFchevron_right

A Password-Based Key Establishment Protocol with Symmetric Key Cryptography

imran ran

2008

View PDFchevron_right

An efficient client–client password-based authentication scheme with provable security

mohammad sabzinejad Farash

View PDFchevron_right

Secure Password Authentication Scheme by using Cryptographic Key Exchange in Servers

Dr. Shadrack Mahenge (PhD)

Secure Password Authentication Scheme by using Cryptographic Key Exchange in Servers, 2017

View PDFchevron_right

Efficient Password-Authenticated Key Exchange Based on RSA

Moti Yung

Lecture Notes in Computer Science, 2006

View PDFchevron_right

An enhanced password authenticated key exchange protocol without server public keys

Hamid Karimnejad

2012 International Conference on ICT Convergence (ICTC), 2012

View PDFchevron_right

Secure Data Protection in Insecure Networks using One Time Password based Encryption

Devaraj Verma

International Journal of Engineering Research and, 2015

View PDFchevron_right

A Method for Making Password-Based Key Exchange Resilient to Server Compromise

Zulfikar Ramzan

2006

View PDFchevron_right

On the Security of Some Password-Based Key Agreement Schemes

Chris Mitchell

Lecture Notes in Computer Science, 2005

View PDFchevron_right

Weaknesses and Improvements of Yang-Chang-Hwang's Password Authentication Scheme

Hao-Chuan Tsai

Informatica (lithuanian Academy of Sciences), 2005

View PDFchevron_right

IJERT-Secure Data Protection in Insecure Networks using One Time Password based Encryption

IJERT Journal

International Journal of Engineering Research and Technology (IJERT), 2015

View PDFchevron_right

A Protected Single Sign-On Technique Using 2D Password in Distributed Computer Networks

International Journal IJRITCC

View PDFchevron_right

Efficient Password Scheme Without Trusted Server

Sattar Aboud

International Journal of Aviation Technology, Engineering and Management, 2011

View PDFchevron_right

The N/R one time password system

Sugata Sanyal

2005

View PDFchevron_right

Intensifying the Authentication Schemes ToFortify the Network Security: A Survey

Wesley Porpatham

2014

View PDFchevron_right

Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions

Olivier Blazy

Topics in Cryptology - CT-RSA 2016, 2016

View PDFchevron_right

A Secure and Efficient Two-Server Password Only Authenticated Key Exchange

sandra bhavadas

IOSR Journal of Computer Engineering, 2014

View PDFchevron_right

A Critical appraisal on Password based Authentication

K Mustafa

International Journal of Computer Network and Information Security

View PDFchevron_right

A study of password security

Michael Luby

Journal of Cryptology, 1989

View PDFchevron_right