Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Secure Remote Password protocol

Known as: SRP, SRP protocol, Secure Remote Password 
The Secure Remote Password protocol (SRP) is an augmented password-authenticated key agreement (PAKE) protocol, specifically designed to work around… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Business process modelling and security engineering are two important concerns when developing information system. However… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2013
2013
The real-time performance of control network between process control system(PCS) in a nuclear power plant is an important factor… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table I
Is this relevant?
2011
2011
 
Is this relevant?
2003
2003
SRP (the secure remote password protocol) is a new secure password authentication and key-exchange protocol. By using verifier… Expand
Is this relevant?
2003
2003
In this paper, we propose a password authentication key exchange protocol for WLANs (Wireless LANs). We call the proposed… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2002
2002
A motorcycle fairing in which a generally U-shaped yoke is mounted on a motorcycle frame. A shield is mounted on said yoke and… Expand
Is this relevant?
2002
2002
The paper evaluates the performances of the Secure Remote Password (SRP) authentication protocol computations. The software… Expand
  • figure 1
  • table 1
  • figure 3
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
1999
Highly Cited
1999
Many authentication schemes depend on secret passwords. Unfortunately, the length and randomness of user-chosen passwords remain… Expand
  • figure I
Is this relevant?
Highly Cited
1999
Highly Cited
1999
Kerberos is a distributed authentication system that many organizations use to handle domain-wide password security. Although it… Expand
  • table 1
  • table 2
  • figure 1
  • table 3
  • table 4
Is this relevant?
Highly Cited
1998
Highly Cited
1998
This paper presents a new password authentication and key-exchange protocol suitable for authenticating users and exchanging keys… Expand
  • table 2
  • table 3
  • table 4
  • table 5
  • table 6
Is this relevant?