Back to Results
First PageMeta Content
Cryptographic protocols / Cryptographic software / Internet protocols / Password / Security token / S/KEY / One-time password / Key-agreement protocol / Salt / Security / Computer security / Cryptography


Prompted User Retrieval of Secret Entropy: The Passmaze Protocol Daniel R. L. Brown∗ December 15, 2005 Abstract A prompting protocol permits users to securely retrieve secrets with greater entropy than
Add to Reading List

Document Date: 2005-12-23 10:31:13


Open Document

File Size: 134,82 KB

Share Result on Facebook

City

Denver / Washington / DC / Cambridge / Diego / Oakland / San Diego / Kerry / San Jose / /

Company

Collaborative Enterprises / AT&T Bell Laboratories / Needham / I.E.E.E. Journal / Enabling Technologies / Microsoft / T Bell Laboratories / /

Country

Austria / Singapore / Ireland / /

Currency

pence / /

Event

FDA Phase / /

Facility

Institute of Electrical / /

IndustryTerm

adequate security in many applications / user authentication technologies / particular device / on-line interactions / password-based authentication protocol / insecure password systems / passmaze protocol / password protocols / password authentication protocol / conventional password protocols / secure password-based authentication protocols / cryptographic algorithms / client device / private key download protocol / cryptographic protocol / /

Organization

Institute of Electrical and Electronics Engineers / United Nations / IEEE Computer Society / /

Person

Alfred Menezes / Seungjoo Kim / Byungchun Kim / Moti Yung / Rene Struik / Yongge Wang / Sungjun Park / Rob Gallant / David Naccache / Sung-Ming Yen / Birgit Pfitzmann / Scott Vanstone / Rafail Ostrovsky / Jonathan Katz / /

Position

system administrator / Speaker / administrator / /

Product

E82B / ndss’99 / /

ProgrammingLanguage

Java / /

ProvinceOrState

Colorado / /

PublishedMedium

Cryptology ePrint Archive / Communications of the ACM / Lecture Notes in Computer Science / /

Technology

passmaze protocol / public key infrastructure / password authentication protocol / password-based authentication protocol / password-based protocol / Information technology / private key / underlying cryptographic protocol / secure password-based authentication protocols / conventional password protocols / The AuthA protocol / user authentication technologies / password protocols / cryptography / public key / Java / private key download protocol / prompting protocol / /

URL

http /

SocialTag