|
S. M. Bellovin and M. Merritt. Encrypted key exchange: Password-based protocol secure against dictionary attacks. In Proceedings of the 1992 IEEE Computer Society Conference on Research in Security and Privacy, pages 72-84, 1992. S. M. Bellovin and M. Merritt. Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise. Technical report AT&T Bell Lab, 1994. D.E. Denning and G.M. Sacco. Timestamps in Key Distribution Protocols. Communication of the ACM, August 1981. W. Diffie and M.E. Hellman. New directions in cryptography. IEEE Transactions on Information Theory, 22(6):644-654, 1976 November. David C. Feldmeier and Philip R. Karn. Unix Password Security-ten years later. In CRYPTO Proceedings, 1989. Ju-Chen Hsueh and Shyh-In Hwang. Design of Authentication Systems with IC cards. Proceeding of the 1999 National computer Symposium, 3:234-243,December 1999. Netscape Inc. Secure Socket Layer. http://www.netscape.com/ D. Jablon. Strong password-only authentication key exchange. Computer Communication Review, 26(5):5-26,October 1996. D. Jablon. Extended password methods immune to dictionary attack. In WETICE ’97 Enterprise Security Workshop, Cambrige, MA, June 1997 Alfred J.Menezes, Paul C. van Oorschot and Scott A. Vanstone. Handbook of Applied Cryptography. CRC Press, New York, 1996 J.T. Kohl and B.C. Neuman. The Kerberos Network Authentication Service(v5). Request for Comments(RFC) 1510, September 1993. L. Lamport. Constructing digital signatures form a one-way function. Technical report CSL-98,SRI International, Palo Alto, 1979 R.H. Morris and K. Thompson. Unix password security. Communications of the ACM, 22(11):594,November 1979 National Bureau of Standards. Data encryption standard. NBS FIPS OUB 46, January 1977. Bruce Schneier. Applied Cryptography. John Wiley & Sons, Inc. New York, 2th edition 1996 J.G. Steiner, B.C. Neuman, and J.I. Schiller. Kerberos: An Authentication service for open network systems. In USENIX Conference Proceedings, Pages 191-202, February 1988 Thomas Wu, The Secure Remote Password Protocol. In Proceedings of the Internet Society Network and Distributed System Security Symposium, pages 97-111, March 1998 Thomas Wu, A Real-World Analysis of Kerberos Password Security. In Proceedings of the 1999 Network and Distributed System Security Symposium, pages 3-5, February 1999.
|