Active Bibliography

1 Prompted User Retrieval of Secret Entropy: The Passmaze Protocol – Daniel R. L. Brown - 2005
10 On the Security of the SPEKE Password-Authenticated Key Exchange Protocol – Philip MacKenzie - 2001
3 Secure Public Instant Messaging – Mohammad Abdul Mannan - 2005
15 Secure network authentication with password identification – Philip Mackenzie, Ram Swaminathan - 1999
36 Analysing Protocols Subject to Guessing Attacks – Gavin Lowe - 2003
25 Secure Password-Based Cipher Suite for TLS – Michael Steiner, Peter Buhler, Thomas Eirich, Michael Waidner - 2001
13 Perfectly secure password protocols in the bounded retrieval model – Giovanni Di Crescenzo, Richard Lipton, Shabsi Walfish - 2006
41 Number Theoretic Attacks On Secure Password Schemes – Sarvar Patel - 1997
75 Session-Key Generation using Human Passwords Only – Oded Goldreich, Yehuda Lindell - 2001
2 Repairing the BlueTooth pairing protocol – Ford-long Wong, Frank Stajano, Jolyon Clulow - 2005
17 Strengthening Passwords – Martín Abadi, Martn Abadi, T. Mark, T. Mark, T. Mark A. Lomas, A. Lomas, Goldman Sachs International, Roger Needham, Roger Needham - 1997
26 The PAK suite: Protocols for Password-Authenticated Key Exchange – Philip MacKenzie - 2002
5 Password-based encryption analyzed – Martín Abadi, Bogdan Warinschi - 2005
1 Password Mistyping in Two-Factor-Authenticated Key Exchange ⋆ – Vladimir Kolesnikov, Charles Rackoff
8 Ultimate solution to authentication via memorable password – Taekyoung Kwon
30 Public-Key Cryptography and Password Protocols: The Multi-User Case – Maurizio Kliban Boyarsky - 1999
5 Key exchange using passwords and long keys – Vladimir Kolesnikov, Charles Rackoff
7 A Protocol for Secure Public Instant Messaging – Mohammad Mannan, Paul C. Van Oorschot - 2006
37 Universally Composable Password-Based Key Exchange – Ran Canetti, Shai Halevi, Jonathan Katz, Yehuda Lindell, Philip Mackenzie - 2005