Keyword : impersonation attack


Cryptanalysis of the Kiyomoto-Fukushima-Tanaka Anonymous Attribute Authentication Scheme
Haeryong PARK 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2009/09/01
Vol. E92-B  No. 9 ; pp. 2946-2947
Type of Manuscript:  LETTER
Category: Fundamental Theories for Communications
Keyword: 
anonymous attribute authenticationuntraceable authenticationself-blindable certificateimpersonation attack
 Summary | Full Text:PDF(59.9KB)

Security Analysis of an ID-Based Key Agreement for Peer Group Communication
Duc-Liem VO Kwangjo KIM 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/11/01
Vol. E90-A  No. 11 ; pp. 2624-2625
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
group key agreementcryptanalysispairingsimpersonation attack
 Summary | Full Text:PDF(53.7KB)

Impersonation Attack on Two-Gene-Relation Password Authentication Protocol (2GR)
Chun-Li LIN Ching-Po HUNG 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2006/12/01
Vol. E89-B  No. 12 ; pp. 3425-3427
Type of Manuscript:  LETTER
Category: Fundamental Theories for Communications
Keyword: 
network securityuser authenticationone-time passwordimpersonation attack
 Summary | Full Text:PDF(111.9KB)

Impersonation Attacks on Key Agreement Protocols Resistant to Denial of Service Attacks
Kyung-Ah SHIM 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2006/07/01
Vol. E89-D  No. 7 ; pp. 2306-2309
Type of Manuscript:  LETTER
Category: Application Information Security
Keyword: 
authenticated key agreement protocolimpersonation attackdenial-of-service attack
 Summary | Full Text:PDF(73KB)

Impersonation Attack on a Dynamic ID-Based Remote User Authentication Scheme Using Smart Cards
Wei-Chi KU Shen-Tien CHANG 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2005/05/01
Vol. E88-B  No. 5 ; pp. 2165-2167
Type of Manuscript:  LETTER
Category: Fundamental Theories for Communications
Keyword: 
dynamic IDimpersonation attackpassword authenticationreparabilitysmart card
 Summary | Full Text:PDF(56.6KB)

Security Analysis of a Threshold Access Control Scheme Based on Smart Cards
Gwoboa HORNG Chao-Liang LIU Yao-Te HWANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/08/01
Vol. E87-A  No. 8 ; pp. 2177-2179
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
cryptanalysisaccess controlthreshold schemeimpersonation attack
 Summary | Full Text:PDF(68KB)

A Generalization of the Simmons' Bounds on Secret-Key Authentication Systems
Hiroki KOGA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/10/25
Vol. E83-A  No. 10 ; pp. 1983-1986
Type of Manuscript:  Special Section LETTER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
authenticationimpersonation attacksubstitution attackinformation-theoretic boundsinformation-spectrum methods
 Summary | Full Text:PDF(209.3KB)

Coding Theorems for Secret-Key Authentication Systems
Hiroki KOGA Hirosuke YAMAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/08/25
Vol. E83-A  No. 8 ; pp. 1691-1703
Type of Manuscript:  PAPER
Category: Information Theory
Keyword: 
authenticationimpersonation attacksubstitution attackinformation-theoretic boundscoding theorem
 Summary | Full Text:PDF(544.6KB)