Full metadata record
DC FieldValueLanguage
dc.contributor.authorLuo, Jia-Ningen_US
dc.contributor.authorShieh, Shiuhpyngen_US
dc.contributor.authorShen, Ji-Chiangen_US
dc.date.accessioned2014-12-08T15:16:00Z-
dc.date.available2014-12-08T15:16:00Z-
dc.date.issued2006-09-01en_US
dc.identifier.issn1016-2364en_US
dc.identifier.urihttp://hdl.handle.net/11536/11895-
dc.description.abstractUsers are normally authenticated via their passwords in computer systems. Since people tend to choose passwords that can be easily remembered, the systems are under the threat of guessing attacks. Many authentication and key distribution protocols have been proposed to protect user passwords from guessing attacks. However, these protocols either are limited to some specific environments or incur high computation and communication costs. In the paper, we first specify five common forms of guessing attacks, which are used to determine whether a protocol is vulnerable to those attacks. Based on these common forms, some guidelines are provided for developing secure protocols that can be used in both symmetric and asymmetric cryptosystems to defend against guessing attacks. Finally, we enhance the well-known authentication system Kerberos and propose two authentication and key distribution protocols, which are both resistant to guessing attacks.en_US
dc.language.isoen_USen_US
dc.subjectnetwork securityen_US
dc.subjectauthenticationen_US
dc.subjectguessing attacken_US
dc.subjectcryptographyen_US
dc.subjectprotocolen_US
dc.titleSecure authentication protocols resistant to guessing attacksen_US
dc.typeArticleen_US
dc.identifier.journalJOURNAL OF INFORMATION SCIENCE AND ENGINEERINGen_US
dc.citation.volume22en_US
dc.citation.issue5en_US
dc.citation.spage1125en_US
dc.citation.epage1143en_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
dc.identifier.wosnumberWOS:000241017600010-
dc.citation.woscount1-
Appears in Collections:Articles


Files in This Item:

  1. 000241017600010.pdf

If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.