11
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

Two phases encryption and its applications

Pages 303-328 | Received 01 Jul 2002, Published online: 03 Jun 2013

References

  • Evans , A. Jr. , Kantrowitz , W. and Weiss , E. 1974 . A User Authentication Scheme not Requiring Secrecy in the Computer . Communications of the Association for Computing Machinery , 17 ( 8 ) August : 437 – 442 . (1974)
  • Hwang , T. Y. October 1983 . “ Password Authentication Using Public-key Encryption ” . In Proceedings of International Carnaham Conference on Security Technology October , 35 – 38 . Zurich , , Switzerland 1983
  • Chang , C. C. and Hwang , S. J. October 1991 . “ Cryptographic Authentication of Passwords ” . In Proceedings of International Carnahan Conference on Security Technology October , 126 – 130 . Taipei , , Taiwan, R.O.C. 1991
  • Purdy , G. B. 1974 . A High Security Log-in Procedure . Communications of the Association for Computing Machinery , 17 ( 8 ) August : 442 – 445 . (1974)
  • Lennon , R. E. , Matyas , S. M. and Meyer , C. H. 1981 . Cryptographic Authentication of Time Invariant Quantities . IEEE Transactions on Communications , COM-29 ( 6 ) June : 773 – 777 . (1981)
  • Denning , D. E. 1982 . Cryptography and Data Security , Reading , MA : Addison-Wesley . 1982
  • Denning , D. E. 1990 . “ The Data Encryption Standard Fifteen Years of Public Scrutiny ” . In Proceedings of Sixth Annual Computer Security Applications Conference x – xv .
  • Miller , Benjamin . 1994 . Vital Sign of Identity . IEEE Spectrum , February : 22 – 30 . 1994
  • Simmons , G. J. 1979 . Symmetric and Asymmetric Encryption . ACM Computing Surveys , 11 ( 4 ) December : 305 – 330 . (1979)
  • Brouwer , A. E. and Emde Boas , P. 1982 . A note on Master Keys for Group Sharing . Information Processing Letters , 14 ( 1 ) : 12 – 14 . (1982)
  • Chiu , K. H. and Chen , W. T. 1989 . Secure Broadcast Using the Secure Lock . IEEE Transactions on Software Engineering , SE-15 ( 8 ) : 929 – 935 . (1989)
  • Denning , D. E. and Schneider , F. B. 1981 . Master Keys for Group Sharing . Information Processing Letters , 12 ( 1 ) : 23 – 25 . (1981)
  • Diffie , W. and Heilman , M. E. 1976 . New Directions in Cryptography . IEEE Transactions on Information Theory , IT-22 ( 6 ) : 644 – 654 . (1976)
  • Gopal , I. S. and Jaffe , J. M. 1984 . Point-to-Multipoint Communication Over Broadcast Links . IEEE Transactions on Communications , COM-32 ( 9 ) : 1034 – 1044 . (1984)
  • Kent , S. T. 1981 . Security Requirements and Protocols for a Broadcast Scenario . IEEE Transactions on Communications , COM-29 ( 6 ) : 778 – 786 . (1981)
  • Lin , S. and Costello , D. J. 1982 . Error Control Coding , New York : Prentice-Hall . 1982
  • 1977 . “ National Bureau of Standards ” . In Data Encryption Standard , Washington, D. C. : Federal Information Processing Standard (FIPS) Publication 46, National Bureau of Standards, U. S. Department of Commerce . 1977
  • Niven , I. and Zuckerman , H. S. 1972 . An Introduction to the Theory of Numbers , New York : John Wiley & Sons . 1972
  • Pohlig , S. and Heilman , M. E. 1978 . An Improved algorithm for Computing Logarithms Over GF(P) and Its Cryptographic Significance . IEEE Transactions on Information Theory , IT-24 ( 1 ) : 106 – 110 . (1978)
  • Needham , R. M. and Schroeder , M. D. 1978 . Using Encryption for Authentication in Larger Networks of Computers . Communications of Association for Computing Machinery , 21 ( 12 ) : 993 – 999 . (1978)
  • Tanenbaum , A. S. 1981 . Computer Networks , New York : Prentice-Hall . 1981
  • Wilkes , M. V. 1991 . Revisiting Computer Security in the Business World . Communications of Association for Computing Machinery , 34 ( 8 ) : 993 – 999 . (1991)
  • Shamir , A. 1979 . How to Share a Secret . Communications of Association for Computing Machinery , 22 ( 11 ) : 612 – 613 . (1979)
  • Voydock , V. L. and Kent , S. T. 1983 . Security Mechanisms in High-Level Network Protocols . Association for Computing Machinery Computing Surveys , 15 ( 2 ) : 135 – 171 . (1983)
  • Shannon , C. 1949 . Communication Theory of Secrecy Systems . Bell System Technology Journal , 28 : 656 – 715 . (1949)
  • Brassard , G. 1983 . Relativized Cryptography . IEEE Transactions on Information Theory , IT-29 ( 6 ) : 877 – 894 . (1983)
  • Landwehr , C. E. , Heitmeyer , C. L. and McLean , J. 1984 . A Security Model for Military Message Systems . Association for Computing Machinery Transactions on Computer Systems , 2 ( 3 ) : 198 – 222 . (1984)
  • Feistel , H. 1973 . Cryptography and Computer Privacy . A Science of American , 228 ( 5 ) : 15 – 33 . (1984)
  • Garey , M. R. and Johnson , D. S. 1979 . Computer and Intractability. A Guide to the Theory of NP-Completeness , San Francisco , California : Freeman . 1979
  • Adleman , L. 1979 . “ A Subexponential Algorithm for the Discrete Logarithm Problem with Applications to Cryptography, in ” . In Proceeding of 20th Symposium on Foundations of Computer Science 55 – 60 . 1997
  • Chiu , K. H. 2001 . A New password Authentication mechanism based on Two Phases encryption . Journal of Information & Optimization Sciences , 22 ( 3 ) : 463 – 480 .
  • Chiu , K. H. and Chen , W. T. 1992 . A New Group Key Generating Model for Group Sharing . Information Sciences , 64 : 83 – 84 . (1992)

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.