完整後設資料紀錄
DC 欄位語言
dc.contributor.authorChang, TYen_US
dc.contributor.authorYang, CCen_US
dc.contributor.authorYang, YWen_US
dc.date.accessioned2014-12-08T15:17:52Z-
dc.date.available2014-12-08T15:17:52Z-
dc.date.issued2005-12-15en_US
dc.identifier.issn0096-3003en_US
dc.identifier.urihttp://dx.doi.org/10.1093/carcin/bgi018en_US
dc.identifier.urihttp://hdl.handle.net/11536/12962-
dc.description.abstractHsu et al. recently pointed out that the Ku-Wang scheme is vulnerable to modification attack and further proposed an improvement on their scheme. However, this article will show the improvement which they claim is still vulnerable by off-line password guessing attack. (c) 2005 Published by Elsevier Inc.en_US
dc.language.isoen_USen_US
dc.subjectcryptographyen_US
dc.subjectinformation securityen_US
dc.subjectkey agreementen_US
dc.subjectkey exchangeen_US
dc.titleCryptanalysis of the improved authenticated key agreement protocolen_US
dc.typeArticleen_US
dc.identifier.doi10.1093/carcin/bgi018en_US
dc.identifier.journalAPPLIED MATHEMATICS AND COMPUTATIONen_US
dc.citation.volume171en_US
dc.citation.issue2en_US
dc.citation.spage771en_US
dc.citation.epage774en_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
dc.identifier.wosnumberWOS:000235539900010-
dc.citation.woscount0-
顯示於類別:期刊論文


文件中的檔案:

  1. 000235539900010.pdf

若為 zip 檔案,請下載檔案解壓縮後,用瀏覽器開啟資料夾中的 index.html 瀏覽全文。