Cryptanalysis on a Three Party Key Exchange Protocol-STPKE`
Shirisha Tallapally, R Padmavathy, Journal of Information Processing Systems Vol. 6, No. 1, pp. 43-52, Mar. 2010
https://doi.org/10.3745/JIPS.2010.6.1.043
Keywords: STPKE’ Protocol, The Proposed Protocol, Undetectable Online Password Guessing Attack
Fulltext:
Abstract
Statistics
Show / Hide Statistics
Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
|
Cite this article
[APA Style]
Tallapally, S. & Padmavathy, R. (2010). Cryptanalysis on a Three Party Key Exchange Protocol-STPKE`. Journal of Information Processing Systems, 6(1), 43-52. DOI: 10.3745/JIPS.2010.6.1.043.
[IEEE Style]
S. Tallapally and R. Padmavathy, "Cryptanalysis on a Three Party Key Exchange Protocol-STPKE`," Journal of Information Processing Systems, vol. 6, no. 1, pp. 43-52, 2010. DOI: 10.3745/JIPS.2010.6.1.043.
[ACM Style]
Shirisha Tallapally and R Padmavathy. 2010. Cryptanalysis on a Three Party Key Exchange Protocol-STPKE`. Journal of Information Processing Systems, 6, 1, (2010), 43-52. DOI: 10.3745/JIPS.2010.6.1.043.