Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chang, TY | en_US |
dc.contributor.author | Yang, CC | en_US |
dc.contributor.author | Yang, YW | en_US |
dc.date.accessioned | 2014-12-08T15:17:52Z | - |
dc.date.available | 2014-12-08T15:17:52Z | - |
dc.date.issued | 2005-12-15 | en_US |
dc.identifier.issn | 0096-3003 | en_US |
dc.identifier.uri | http://dx.doi.org/10.1093/carcin/bgi018 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/12962 | - |
dc.description.abstract | Hsu et al. recently pointed out that the Ku-Wang scheme is vulnerable to modification attack and further proposed an improvement on their scheme. However, this article will show the improvement which they claim is still vulnerable by off-line password guessing attack. (c) 2005 Published by Elsevier Inc. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | cryptography | en_US |
dc.subject | information security | en_US |
dc.subject | key agreement | en_US |
dc.subject | key exchange | en_US |
dc.title | Cryptanalysis of the improved authenticated key agreement protocol | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1093/carcin/bgi018 | en_US |
dc.identifier.journal | APPLIED MATHEMATICS AND COMPUTATION | en_US |
dc.citation.volume | 171 | en_US |
dc.citation.issue | 2 | en_US |
dc.citation.spage | 771 | en_US |
dc.citation.epage | 774 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:000235539900010 | - |
dc.citation.woscount | 0 | - |
Appears in Collections: | Articles |
Files in This Item:
If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.