1 resultado para Peronist Feminine Party
em Biblioteca Digital da Produção Intelectual da Universidade de São Paulo
Filtro por publicador
- JISC Information Environment Repository (1)
- Repository Napier (1)
- Aberdeen University (3)
- Aberystwyth University Repository - Reino Unido (2)
- Aquatic Commons (5)
- Archive of European Integration (151)
- Aston University Research Archive (21)
- Biblioteca Digital | Sistema Integrado de Documentación | UNCuyo - UNCUYO. UNIVERSIDAD NACIONAL DE CUYO. (2)
- Biblioteca Digital da Câmara dos Deputados (1)
- Biblioteca Digital da Produção Intelectual da Universidade de São Paulo (1)
- Biblioteca Digital de la Universidad Católica Argentina (1)
- Bibloteca do Senado Federal do Brasil (7)
- BORIS: Bern Open Repository and Information System - Berna - Suiça (28)
- Brock University, Canada (5)
- Bucknell University Digital Commons - Pensilvania - USA (3)
- CentAUR: Central Archive University of Reading - UK (31)
- Center for Jewish History Digital Collections (13)
- Chapman University Digital Commons - CA - USA (4)
- Chinese Academy of Sciences Institutional Repositories Grid Portal (1)
- Comissão Econômica para a América Latina e o Caribe (CEPAL) (7)
- CORA - Cork Open Research Archive - University College Cork - Ireland (3)
- Dalarna University College Electronic Archive (3)
- DI-fusion - The institutional repository of Université Libre de Bruxelles (2)
- Digital Archives@Colby (6)
- Digital Commons - Michigan Tech (1)
- Digital Commons @ DU | University of Denver Research (1)
- Digital Commons at Florida International University (7)
- Digital Peer Publishing (2)
- DigitalCommons@The Texas Medical Center (2)
- Digitale Sammlungen - Goethe-Universität Frankfurt am Main (1)
- Doria (National Library of Finland DSpace Services) - National Library of Finland, Finland (1)
- DRUM (Digital Repository at the University of Maryland) (4)
- Duke University (1)
- Gallica, Bibliotheque Numerique - Bibliothèque nationale de France (French National Library) (BnF), France (2)
- Greenwich Academic Literature Archive - UK (2)
- Harvard University (22)
- Helda - Digital Repository of University of Helsinki (6)
- Indian Institute of Science - Bangalore - Índia (1)
- Línguas & Letras - Unoeste (2)
- Memoria Académica - FaHCE, UNLP - Argentina (26)
- Memorial University Research Repository (1)
- Ministerio de Cultura, Spain (3)
- Nottingham eTheses (1)
- Portal de Revistas Científicas Complutenses - Espanha (1)
- QUB Research Portal - Research Directory and Institutional Repository for Queen's University Belfast (86)
- Queensland University of Technology - ePrints Archive (114)
- RDBU - Repositório Digital da Biblioteca da Unisinos (1)
- ReCiL - Repositório Científico Lusófona - Grupo Lusófona, Portugal (1)
- Repositório digital da Fundação Getúlio Vargas - FGV (3)
- Repositório Institucional UNESP - Universidade Estadual Paulista "Julio de Mesquita Filho" (6)
- Research Open Access Repository of the University of East London. (1)
- SAPIENTIA - Universidade do Algarve - Portugal (1)
- SerWisS - Server für Wissenschaftliche Schriften der Fachhochschule Hannover (1)
- Universidad de Alicante (2)
- Universidad del Rosario, Colombia (3)
- Universidad Politécnica de Madrid (1)
- Universidade Complutense de Madrid (1)
- Universidade de Lisboa - Repositório Aberto (2)
- Universitätsbibliothek Kassel, Universität Kassel, Germany (1)
- Université de Lausanne, Switzerland (1)
- Université de Montréal (8)
- Université de Montréal, Canada (13)
- University of Canberra Research Repository - Australia (2)
- University of Michigan (137)
- University of Queensland eSpace - Australia (7)
- University of Southampton, United Kingdom (1)
- WestminsterResearch - UK (11)
Resumo:
Three-party password-authenticated key exchange (3PAKE) protocols allow entities to negotiate a secret session key with the aid of a trusted server with whom they share a human-memorable password. Recently, Lou and Huang proposed a simple 3PAKE protocol based on elliptic curve cryptography, which is claimed to be secure and to provide superior efficiency when compared with similar-purpose solutions. In this paper, however, we show that the solution is vulnerable to key-compromise impersonation and offline password guessing attacks from system insiders or outsiders, which indicates that the empirical approach used to evaluate the scheme's security is flawed. These results highlight the need of employing provable security approaches when designing and analyzing PAKE schemes. Copyright (c) 2011 John Wiley & Sons, Ltd.