Password-based authenticated key exchange in the three-party setting

M Abdalla, PA Fouque, D Pointcheval - … on Theory and Practice in Public …, 2005 - Springer
Password-based authenticated key exchange are protocols which are designed to be
secure even when the secret key or password shared between two users is drawn from a …

Interactive Diffie-Hellman assumptions with applications to password-based authentication

M Abdalla, D Pointcheval - Financial Cryptography and Data Security: 9th …, 2005 - Springer
Password-based authenticated key exchange are protocols that are designed to provide
strong authentication for client-server applications, such as online banking, even when the …

Password-based authenticated key exchange in the three-party setting

M Abdalla, PA Fouque, D Pointcheval - IEE Proceedings-Information Security, 2006 - IET
Password-based authenticated key exchange (PAKE) consists of protocols which are
designed to be secure even when the secret key used for authentication is a human …

Implementing caches in a 3D technology for high performance processors

K Puttaswamy, GH Loh - 2005 International Conference on …, 2005 - ieeexplore.ieee.org
3D integration is an emergent technology that has the potential to greatly increase device
density while simultaneously providing faster on-chip communication. 3D fabrication …

Efficient verifier-based password-authenticated key exchange in the three-party setting

JO Kwon, IR Jeong, K Sakurai, DH Lee - Computer Standards & Interfaces, 2007 - Elsevier
In the last few years, researchers have extensively studied the password-authenticated key
exchange (PAKE) in the three-party setting. The fundamental security goal of PAKE is …

Leveraging category-level labels for instance-level image retrieval

A Gordoa, JA Rodriguez-Serrano… - … IEEE Conference on …, 2012 - ieeexplore.ieee.org
In this article, we focus on the problem of large-scale instance-level image retrieval. For
efficiency reasons, it is common to represent an image by a fixed-length descriptor which is …

A system framework of security management in enterprise systems

F Wang, B Ge, L Zhang, Y Chen… - Systems Research and …, 2013 - Wiley Online Library
After analysing the security conditions in current Enterprise Systems (ES), this paper
proposes a systematic framework that is based on the Secure Sockets Layer Virtual Private …

EC2C-PAKA: An efficient client-to-client password-authenticated key agreement

JW Byun, DH Lee, JI Lim - Information Sciences, 2007 - Elsevier
Most password-authenticated key agreement schemes described in the literature have
focused on authenticated key agreement using a shared password between a client and a …

Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)

RCW Phan, WC Yau, BM Goi - Information sciences, 2008 - Elsevier
Password-authenticated key exchange (PAKE) protocols allow parties to share secret keys
in an authentic manner based on an easily memorizable password. Recently, Lu and Cao …

Actions speak louder than words: Proving bisimilarity for context-free processes

H Huttel, C Stirling - Proceedings 1991 Sixth Annual IEEE Symposium …, 1991 - computer.org
Most existing cross-realm client-to-client password authenticated key exchange (C2C-
PAKE) protocols can not resist password-compromise impersonation (PCI) attack. This …