A Real-World Analysis of Kerberos Password Security (1999)

Cached

Download Links

by Thomas Wu
Citations:57 - 0 self

Active Bibliography

Authentication in Distributed System – n.n.
175 The secure remote password protocol – Thomas Wu - 1998
14 Dual-workfactor Encrypted Key Exchange: Efficiently Preventing Password Chaining and Dictionary Attacks – Barry Jaspan - 1996
11 Pdm: A new strong password-based protocol – Charlie Kaufman, Iris Associates - 2001
3 The Design, Implementation, And Evaluation Of Cryptographic Distributed Applications: Secure PVM – Nair Venugopal - 1996
91 Some New Attacks upon Security Protocols – Gavin Lowe - 1996
6 Password Exhaustion: Predicting the End of Password Usefulness – Luke St. Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick Mcdaniel, Trent Jaeger
J-PAKE: Authenticated Key Exchange Without PKI – Feng Hao, Peter Ryan
On Small Subgroup Non-confinement Attack – Feng Hao
Kryptografické eskalační protokoly – část 1. – Jan Krhovják, Fakulta Informatiky
Crypto-World 9/2005 Crypto-World – Informační Sešit Gcucmp, Připravil Mgr, Pavel Vondruška
From: Proceedings of the 1999 IEEE Symposium on Security and Privacy. – Copyright By The
12 Software Smart Cards via Cryptographic Camouflage – D. N. Hoover, B. N. Kausik - 1999
41 Networked Cryptographic Devices Resilient to Capture – Philip Mackenzie, Michael K. Reiter - 2003
6 A Method for Examining Cryptographic Protocols – Brett C. Tjaden - 1997
25 Secure Password-Based Cipher Suite for TLS – Michael Steiner, Peter Buhler, Thomas Eirich, Michael Waidner - 2001
Abstract Comparing Passwords, Tokens, and Biometrics for User Authentication – unknown authors
2 T.: Delegated cryptography, online trusted third parties – Trevor Perrin, Logan Bruns, Jahan Moreh, Terry Olkin - 2002
17 The Password Thicket: technical and market failures in human authentication on the web – Joseph Bonneau, Sören Preibusch - 2010