Full metadata record
DC FieldValueLanguage
dc.contributor.authorChang, TYen_US
dc.contributor.authorYang, CCen_US
dc.contributor.authorYang, YWen_US
dc.date.accessioned2014-12-08T15:17:52Z-
dc.date.available2014-12-08T15:17:52Z-
dc.date.issued2005-12-15en_US
dc.identifier.issn0096-3003en_US
dc.identifier.urihttp://dx.doi.org/10.1093/carcin/bgi018en_US
dc.identifier.urihttp://hdl.handle.net/11536/12962-
dc.description.abstractHsu et al. recently pointed out that the Ku-Wang scheme is vulnerable to modification attack and further proposed an improvement on their scheme. However, this article will show the improvement which they claim is still vulnerable by off-line password guessing attack. (c) 2005 Published by Elsevier Inc.en_US
dc.language.isoen_USen_US
dc.subjectcryptographyen_US
dc.subjectinformation securityen_US
dc.subjectkey agreementen_US
dc.subjectkey exchangeen_US
dc.titleCryptanalysis of the improved authenticated key agreement protocolen_US
dc.typeArticleen_US
dc.identifier.doi10.1093/carcin/bgi018en_US
dc.identifier.journalAPPLIED MATHEMATICS AND COMPUTATIONen_US
dc.citation.volume171en_US
dc.citation.issue2en_US
dc.citation.spage771en_US
dc.citation.epage774en_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
dc.identifier.wosnumberWOS:000235539900010-
dc.citation.woscount0-
Appears in Collections:Articles


Files in This Item:

  1. 000235539900010.pdf

If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.