Journal of shanghai Jiaotong University (Science) ›› 2011, Vol. 16 ›› Issue (5): 600-603.doi: 10.1007/s12204-011-1195-3
• Articles • Previous Articles Next Articles
LO Nai-wei (罗乃维), YEH Kuo-hui (叶国晖)
Received:
2011-05-10
Online:
2011-10-29
Published:
2011-10-20
Contact:
LO Nai-wei (罗乃维),
E-mail:nwlo@cs.ntust.edu.tw
Supported by:
the National Science Council (Nos. NSC99-2218-E-011-014 and NSC 100-2219-E-011-002)
CLC Number:
LO Nai-wei (罗乃维), YEH Kuo-hui (叶国晖). Simple Three-Party Password Authenticated Key Exchange Protocol[J]. Journal of shanghai Jiaotong University (Science), 2011, 16(5): 600-603.
1 Lu R X, Cao Z F. Simple three-party key exchange protocol [J]. Computers and Security, 2007, 26(1): 94-97. 2 Chung H R, Ku W C. Three weaknesses in a simple three-party key exchange protocol [J]. Information Sciences, 2008, 178(1): 220-229. 3 Guo H, Li Z J, Mu Y, et al. Cryptanalysis of simple three-party key exchange protocol [J]. Computers and Security, 2008, 27(1-2): 16-21. 4 Nam J Y, Paik J Y, Kang H K, et al. An off-line dictionary attack on a simple three-party key exchange protocol [J]. IEEE Communications Letters, 2009, 13(3): 205-207. 5 Phan R C-W, Yau W C, Goi B M. Cryptanalysis of simple three-party key exchange protocol (S-3PAKE) [J]. Information Sciences, 2008, 178(13): 2849-2856. 6 Ding Y, Horster P. Undetectable on-line password guessing attacks [J]. ACM SIGOPS Operating Systems Review, 1995, 29(4): 77-86. 7 Chien Hung-yu, Laih Chi-sung. ECC-based lightweight authentication protocol with untraceability for low-cost RFID [J]. Journal of Parallel and Distributed Computing, 2009, 69(10): 848-853. 8 Lin S, Costello D J. Error control coding: Fundamentals and applications [M]. New Jersey: Prentice-Hall Press, 1983. |
[1] | LI Hongxin, ZHONG Zuhao, LU Yi, WEN Yunfeng. Optimization of Frequency Control Parameters of Wind Farms Considering Inertia Security Requirement [J]. Journal of Shanghai Jiao Tong University, 2025, 59(3): 323-332. |
[2] | TANG Cheng, LIANG Yilin, LI Wenjie, CHEN Guoling. Research on Security of Wideband Communication Satellite Situational Awareness Network [J]. Air & Space Defense, 2025, 8(2): 136-141. |
[3] | CHEN Yi, WANG Han, ZENG Dan, YAN Zheng, XUE Bike, ZHAO Le, XIONG Xuejun, FENG Yuyao. A Fast Calculation Method for N-1 Security-Constrained Economic Dispatch via Low-Rank Approximation Surrogate Model [J]. Journal of Shanghai Jiao Tong University, 2024, 58(10): 1524-1533. |
[4] | YE Lun, OUYANG Xu, YAO Jiangang, YANG Shengjie, YIN Jungang. Reliability Index Calculation and Reserve Capacity Optimization Considering Multiple Uncertainties [J]. Journal of Shanghai Jiao Tong University, 2024, 58(1): 30-39. |
[5] | ZHANG Qingguo, LIU Chunyue, LUO Song, WANG Shuili, LIU Qing. Current Status and Prospects of External Security Technology for Offshore Platforms [J]. Ocean Engineering Equipment and Technology, 2023, 10(4): 92-106. |
[6] | WANG Zhaoxi, SHENG Peng, LI Yunyun, WU Xinkai, HUANG Yuejin. Multiaxial Vibration Security and Validity Verification of Connecting Pieces in Typical Section [J]. Air & Space Defense, 2023, 6(1): 85-95. |
[7] | WU Nan, CHENG Zhetao, DU Liang, SHEN Yingping. Network Security Inference Method Based on Dempster-Shafer Theory [J]. Journal of Shanghai Jiao Tong University, 2021, 55(S2): 77-81. |
[8] | ZHOU Yi, QIN Kangping, SUN Jinwen, FAN Dongqi, ZHENG Yiming. Real-Time Risk Evaluation Method of Power System Equipment and N-m Fault Contingency Plan Generation Under Typhoon Meteorological Environment [J]. Journal of Shanghai Jiao Tong University, 2021, 55(S2): 22-30. |
[9] | ZHANG Liang, QU Gang, LI Huixing, JIN Haochun. Research and Application of Key Technologies of Network Security Situation Awareness for Smart Grid Power Control Systems [J]. Journal of Shanghai Jiao Tong University, 2021, 55(S2): 103-109. |
[10] | ZHANG Taolue∗ (张韬略), TU Huizhao (涂辉招), QIU Wei (邱 炜). Developing High-Precision Maps for Automated Driving in China: Legal Obstacles and the Way to Overcome Them [J]. J Shanghai Jiaotong Univ Sci, 2021, 26(5): 658-669. |
[11] | CHEN Ying, WEI Guoning, TANG Shengyong, KANG Zhiyu. Global Space Security Situation Analysis and Development Proposal [J]. Air & Space Defense, 2021, 4(3): 99-104. |
[12] | WANG Mingzheng, WANG Yijie, WANG Tianyu, HOU Linzao, LI Mian . New Approach for Information Security Evaluation and Management of IT Systems in Educational Institutions [J]. J Shanghai Jiaotong Univ Sci, 2020, 25(6): 689-699. |
[13] | YANG Guangyu, QIU Hongbing. Robust Optimization for Energy Efficiency for Secrecy MIMO SWIPT Systems [J]. Journal of Shanghai Jiao Tong University, 2020, 54(4): 369-375. |
[14] | GUO Fei (郭非), CAO Zhenfu (曹珍富), LIU Zhusen (刘竹森), CAO Nanyuan (曹楠源). A Privacy-Preserving Aggregation and Authentication Scheme Towards Mobile Users in Smart Grid [J]. Journal of Shanghai Jiao Tong University (Science), 2020, 25(1): 37-43. |
[15] | SUN Zhuo,LIU Dong,XIAO Anhong,MING Pingzhou,GUO Wen,ZHOU Junyi,CHEN Junjie. Information Security Analysis of Digital Control System Based on Attack Tree Model [J]. Journal of Shanghai Jiaotong University, 2019, 53(Sup.1): 68-73. |
Viewed | ||||||||||||||||||||||||||||||||||||||||||||||||||
Full text 479
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||
Abstract 6932
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||