Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
10340404 | Computer Standards & Interfaces | 2005 | 10 Pages |
Abstract
Recently, Zhu et al. proposed a password authenticated key exchange protocol based on RSA. Then, Yeh et al. demonstrated that Zhu et al.'s protocol suffers from the undetectable password-guessing attacks and proposed an improved version. However, there are still some security flaws in Yeh et al.'s proposed protocol. Moreover, the computation load of the wireless device is not light enough. For lightening the computation load, a secure and practical protocol is presented in this paper.
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Ya-Fen Chang, Chin-Chen Chang, Jen-Ho Yang,