Article ID Journal Published Year Pages File Type
10340404 Computer Standards & Interfaces 2005 10 Pages PDF
Abstract
Recently, Zhu et al. proposed a password authenticated key exchange protocol based on RSA. Then, Yeh et al. demonstrated that Zhu et al.'s protocol suffers from the undetectable password-guessing attacks and proposed an improved version. However, there are still some security flaws in Yeh et al.'s proposed protocol. Moreover, the computation load of the wireless device is not light enough. For lightening the computation load, a secure and practical protocol is presented in this paper.
Related Topics
Physical Sciences and Engineering Computer Science Computer Networks and Communications
Authors
, , ,