Results 111 to 120 of about 400,439 (156)
Some of the next articles are maybe not open access.

Cryptographic Key Agreement Protocol Simulation

2010 Sixth International Conference on Semantics, Knowledge and Grids, 2010
The High Assurance Internet Protocol Encrypt or (HAIPE) Interoperability Specification is developed by the US Department of Defense to permit enclaves equipped with compliant gateways to communicate securely over un-trusted networks. Using Cryptographic Key Agreement protocol, e.g., Internet Key Exchange (IKE), HAIPEs can establish automated security ...
Zhang Chuan-fu   +3 more
openaire   +1 more source

Key Agreement Protocols

2003
Key agreement, as the name implies, is a process in which principals cooperate in order to establish a session key. Amongst the class of public key protocols for key establishment without a server, key agreement has become much more popular than key transport in recent years.
Colin Boyd, Anish Mathuria
openaire   +1 more source

New authenticated key agreement protocols

The 2011 International Conference on Computer Engineering & Systems, 2011
Key agreement protocols are used to establish common keys between two or more entities. The established key can then be used to assure confidentiality of exchanged messages through encryption. Additionally, authenticated key agreement protocols offer implicit authentication.
Hassan M. Elkamchouchi   +2 more
openaire   +1 more source

An Efficient Protocol for Authenticated Key Agreement

Designs, Codes and Cryptography, 2003
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Law, Laurie   +4 more
openaire   +1 more source

Certificateless Key Agreement Protocol

2010 2nd International Conference on E-business and Information System Security, 2010
Certificateless cryptography aims at combining the advantages of identity based and public key cryptography in order to avoid the key escrow problem inherent in the identity based cryptography and cumbersome certificate management in the traditional public key infrastructure.
openaire   +1 more source

An Improved Conference Key Agreement Protocol

2008 International Conference on Computational Intelligence and Security, 2008
A conference-key protocol is used to establish a common conference key K such that a group of people can communicate securely over a public network. To improve the implementation efficiency of Tzeng?s conference-key agreement protocol, an efficient conference-key agreement protocol is proposed under the authenticated broadcast channel.
Xing-lan Zhang, Quan-min Wang
openaire   +1 more source

Secure Group Key Agreement Protocols

2018
This chapter focusses on Secure Key Exchange protocols executed among a group of parties, called group key exchange (GKE) protocols. Authentication and Key Establishment are very important in any secure communication. Authentication is generally based on long-term keys which can be associated with identities. To associate identities with long-term keys,
Kannan Balasubramanian, Mala K.
openaire   +1 more source

Improved authenticated multi-key agreement protocol

Wuhan University Journal of Natural Sciences, 2006
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Zhang, Hua, Yuan, Zheng, Wen, Qiaoyan
openaire   +2 more sources

An improved authenticated key agreement protocol

Journal of Electronics (China), 2005
In 1999, Seo and Sweeney proposed a simple authenticated key agreement protocol that was designed to act as a Diffie-Hellman key agreement protocol with user authentication. Various attacks on this protocol are described and enhanced in the literature. Recently, Ku and Wang proposed an improved authenticated key agreement protocol, where they asserted ...
Changji Wang, Bo Yang, Jianping Wu
openaire   +1 more source

A Promising Key Agreement Protocol

2003
In 1999, Seo and Sweeney proposed a simple authenticated key agreement protocol(SAKA) that was designed to act as a Diffie-Hellman scheme with user authentication. However, the protocol was subsequently found to have security flaws and enhanced in the literature. Recently, Ku and Wang showed a variant of SAKA.
Eun-Kyung Ryu   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy