|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 34 occurrences of 19 keywords
|
|
|
Results
Found 30 publication records. Showing 30 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
95 | Wenting Jin, Jing Xu 0002 |
An Efficient and Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol with Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings, pp. 299-314, 2009, Springer, 978-3-642-10432-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Password-authenticated key agreement, Client-to-client, Smart cards, Provable security, Cross-realm |
95 | Kazuki Yoneyama, Haruki Ota, Kazuo Ohta |
Secure Cross-Realm Client-to-Client Password-Based Authenticated Key Exchange Against Undetectable On-Line Dictionary Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAECC ![In: Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 17th International Symposium, AAECC-17, Bangalore, India, December 16-20, 2007, Proceedings, pp. 257-266, 2007, Springer, 978-3-540-77223-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
different password, C2C-PAKE, cross-realm setting, undetectable on-line dictionary attacks, Authenticated key exchange |
95 | Raphael C.-W. Phan, Bok-Min Goi |
Cryptanalysis of Two Provably Secure Cross-Realm C2C-PAKE Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings, pp. 104-117, 2006, Springer, 3-540-49767-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
client-to-client, cryptanalysis, provable security, security model, Password-authenticated key exchange, cross realm |
86 | Yin Yin, Bao Li 0001 |
Secure Cross-Realm C2C-PAKE Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings, pp. 395-406, 2006, Springer, 3-540-35458-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
74 | Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Christopher Walstad |
Specifying Kerberos 5 cross-realm authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WITS ![In: Proceedings of the POPL 2005 Workshop on Issues in the Theory of Security, WITS 2005, Long Beach, California, USA, January 10-11, 2005, pp. 12-26, 2005, ACM, 1-58113-980-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
70 | Shuhua Wu, Yuefei Zhu |
Password-Authenticated Key Exchange between Clients in a Cross-Realm Setting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NPC ![In: Network and Parallel Computing, IFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008. Proceedings, pp. 94-104, 2008, Springer, 978-3-540-88139-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
provably secure, Password, authenticated key exchange, cross-realm |
61 | Saber Zrelli, Tunç D. Medeni, Yoichi Shinoda, Ihsan Tolga Medeni |
Improving Kerberos Security System for Cross-Realm Collaborative Interactions: An Innovative Example of Knowledge Technology for Evolving & Verifiable E-Society. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RIVF ![In: 2007 IEEE International Conference on Research, Innovation and Vision for the Future in Computing & Communication Technologies, RIVF 2007, Hanoi, Vietnam, 5-9 March 2007, pp. 211-219, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
58 | Shuhong Wang 0001, Jie Wang 0038, Maozhi Xu |
Weaknesses of a Password-Authenticated Key Exchange Protocol between Clients with Different Passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings, pp. 414-425, 2004, Springer, 3-540-22217-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Cross-realm setting, Security, Dictionary attacks, Password-authenticated key exchange |
58 | Fucai Zhou, Xiumei Liu, Hong Yan, Guiran Chang |
Cryptanalysis and Improvement of EC2C-PAKA Protocol in Cross-Realm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NPC Workshops ![In: IFIP International Conference on Network and Parallel Computing, NPC 2008, Shanghai, China, October 18-21, 2008, Workshop Proceedings, pp. 82-87, 2008, IEEE Computer Society, 978-0-7695-3354-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
C2C-PAKA, password-compromise impersonate attack, Cross-Realm |
49 | Dacheng Zhang, Jie Xu 0007, Xianxian Li |
Dynamic Cross-Realm Authentication for Multi-Party Service Interactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: The 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2007, 25-28 June 2007, Edinburgh, UK, Proceedings, pp. 440-449, 2007, IEEE Computer Society, 0-7695-2855-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Secure Service Collaborations, Workflow Business Sessions, Web Services, Authentication, Multi-Party Interactions |
46 | Dengguo Feng, Jing Xu 0002 |
A New Client-to-Client Password-Authenticated Key Agreement Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCC ![In: Coding and Cryptology, Second International Workshop, IWCC 2009, Zhangjiajie, China, June 1-5, 2009. Proceedings, pp. 63-76, 2009, Springer, 978-3-642-01813-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Password-authenticated key agreement, cryptanalysis, provable security, cross-realm |
46 | Jin Wook Byun, Ik Rae Jeong, Dong Hoon Lee 0001, Chang-Seop Park |
Password-Authenticated Key Exchange between Clients with Different Passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings, pp. 134-146, 2002, Springer, 3-540-00164-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
key exchange, Password authentication, dictionary attack, Kerberos, cross-realm |
28 | Syed Zubair Ahmad, Muhammad Abdul Qadir 0001 |
Terminal Mobility Services in the Middleware Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICCSA ![In: 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 13-16 May 2007, Amman, Jordan, pp. 332-335, 2007, IEEE Computer Society, 1-4244-1030-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Dan Zhu, Xueying Wang, Hongfeng Zhu |
Semi-quantum-honest key agreement scheme with three-particle entangled states in cross-realm setting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Quantum Inf. Process. ![In: Quantum Inf. Process. 19(10), pp. 376, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Saber Zrelli, Nobuo Okabe, Yoichi Shinoda |
XKDCP: An Inter-KDC Protocol for Dependable Kerberos Cross-Realm Operations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Networks ![In: J. Networks 8(2), pp. 290-296, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Jie Xu 0007, Dacheng Zhang, Lu Liu 0001, Xianxian Li |
Dynamic Authentication for Cross-Realm SOA-Based Business Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Serv. Comput. ![In: IEEE Trans. Serv. Comput. 5(1), pp. 20-32, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
24 | Sam Hartman, Kenneth Raeburn, Larry Zhu |
Kerberos Principal Name Canonicalization and Cross-Realm Referrals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 6806, pp. 1-19, November 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
24 | Po-Jen Chuang, Yi-Ping Liao |
Efficient and Secure Cross-Realm Client-to-Client Password-Authenticated Key Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: IEEE 26th International Conference on Advanced Information Networking and Applications, AINA, 2012 , Fukuoka, Japan, March 26-29, 2012, pp. 701-708, 2012, IEEE Computer Society, 978-1-4673-0714-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
24 | Jing Xu 0002, Wen Tao Zhu, Wenting Jin |
A generic framework for constructing cross-realm C2C-PAKA protocols based on the smart card. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Concurr. Comput. Pract. Exp. ![In: Concurr. Comput. Pract. Exp. 23(12), pp. 1386-1398, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Jinqing Li, Fengming Bai |
A Distributed Cross-Realm Identification Scheme Based on Hyperchaos System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSISE (2) ![In: Advances in Computer Science, Intelligent System and Environment [Proceedings of CSISE 2011, Volume 2, September 24-25, 2011, Guangzhou, China], pp. 147-152, 2011, Springer, 978-3-642-23755-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Wei-Chuen Yau, Raphael C.-W. Phan, Bok-Min Goi, Swee-Huay Heng |
Cryptanalysis of a Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol of CANS '09. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings, pp. 172-184, 2011, Springer, 978-3-642-25512-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Qing Dai, Xiufeng Zhao, Qiuliang Xu, Han Jiang 0001 |
A New Cross-realm Group Password-based Authenticated Key Exchange Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Seventh International Conference on Computational Intelligence and Security, CIS 2011, Sanya, Hainan, China, December 3-4, 2011, pp. 856-860, 2011, IEEE Computer Society, 978-1-4577-2008-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Jing-feng Li, Weifeng Guo, Lai-shun Zhang, Yun-peng Li |
Cryptoanalysis and Improvement of Verifier-based Key Agreement Protocol in Cross-Realm Setting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Seventh International Conference on Computational Intelligence and Security, CIS 2011, Sanya, Hainan, China, December 3-4, 2011, pp. 925-929, 2011, IEEE Computer Society, 978-1-4577-2008-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Shoichi Sakane, Kenichi Kamada, Saber Zrelli, Masahiro Ishiyama |
Problem Statement on the Cross-Realm Operation of Kerberos. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 5868, pp. 1-13, May 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Kazuki Yoneyama |
Cross-Realm Password-Based Server Aided Key Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications - 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers, pp. 322-336, 2010, Springer, 978-3-642-17954-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Shuhua Wu, Yuefei Zhu |
Client-to-client Password-Based Authenticated Key Establishment in a Cross-Realm Setting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Networks ![In: J. Networks 4(7), pp. 649-656, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Fengjiao Wang, Yuqing Zhang |
A New Security Model for Cross-Realm C2C-PAKE Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2007, pp. 342, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
12 | Jin Wook Byun, Dong Hoon Lee 0001, Jongin Lim 0001 |
Efficient and Provably Secure Client-to-Client Password-Based Key Exchange Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APWeb ![In: Frontiers of WWW Research and Development - APWeb 2006, 8th Asia-Pacific Web Conference, Harbin, China, January 16-18, 2006, Proceedings, pp. 830-836, 2006, Springer, 3-540-31142-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Human memorable password, different password authentication, mobile computing, dictionary attacks, authenticated key exchange |
12 | Eun-Jun Yoon, Kee-Young Yoo |
A Secure Password-Authenticated Key Exchange Between Clients with Different Passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APWeb Workshops ![In: Advanced Web and Network Technologies, and Applications, APWeb 2006 International Workshops: XRA, IWSN, MEGA, and ICSE, Harbin, China, January 16-18, 2006, Proceedings, pp. 659-663, 2006, Springer, 3-540-31158-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Kerberus, C2C-PAKE, Security, Cryptography, Key agreement |
12 | Jeeyeon Kim, Seungjoo Kim, Jin Kwak, Dongho Won |
Cryptanalysis and Improvement of Password Authenticated Key Exchange Scheme between Clients with Different Passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part I, pp. 895-902, 2004, Springer, 3-540-22054-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #30 of 30 (100 per page; Change: )
|
|