Results 181 to 190 of about 12,317,693 (236)
Some of the next articles are maybe not open access.
32nd IEEE Conference on Local Computer Networks (LCN 2007), 2007
Secure group communication has various applications. Requirements for an application differ in various parameters such as tolerance times for join and leave, arrival rate, departure rate, staying period and group life time. Existing group key agreement protocols do not harness knowledge of application requirements.
INGLE, RAJESH, SIVAKUMAR, G
openaire +2 more sources
Secure group communication has various applications. Requirements for an application differ in various parameters such as tolerance times for join and leave, arrival rate, departure rate, staying period and group life time. Existing group key agreement protocols do not harness knowledge of application requirements.
INGLE, RAJESH, SIVAKUMAR, G
openaire +2 more sources
A provably-secure authenticated key agreement protocol for remote patient monitoring IoMT
Journal of systems architecture, 2023Chien-Ming Chen +4 more
semanticscholar +1 more source
Blockchain-assisted authenticated key agreement scheme for IoT-based healthcare system
Internet of Things, 2023Ashish Tomar +3 more
semanticscholar +1 more source
Quantum Conference Key Agreement
2021Quantum conference key agreement (CKA) extends the notion of quantum key distribution (QKD) to the multipartite scenario. We introduce CKA in Sect. 4.1 and present the multipartite generalization of the BB84 protocol, including insight on its security proof and asymptotic key rate. In Sect.
openaire +1 more source
2006
Especially for key establishment protocols to be used in internet applications, the (privacy) concern of deniability arises: Can a protocol transcript be used—possibly by a participant—to prove the involvement of another party in the protocol? For two party key establishment protocols, a common technique for achieving deniability is the replacement of ...
Jens-Matthias Bohli, Rainer Steinwandt
openaire +1 more source
Especially for key establishment protocols to be used in internet applications, the (privacy) concern of deniability arises: Can a protocol transcript be used—possibly by a participant—to prove the involvement of another party in the protocol? For two party key establishment protocols, a common technique for achieving deniability is the replacement of ...
Jens-Matthias Bohli, Rainer Steinwandt
openaire +1 more source
Certificates, Key Transport and Key Agreement
2015We can now perform encryption and authentication using either public key techniques or symmetric key techniques. However, we have not addressed how parties actually obtain the public key of an entity, or obtain a shared symmetric key. When using hybrid ciphers in Section 16.3 we showed how a symmetric key could be transported to another party, and then
openaire +1 more source
Certificateless Key Agreement Protocol
2010 2nd International Conference on E-business and Information System Security, 2010Certificateless cryptography aims at combining the advantages of identity based and public key cryptography in order to avoid the key escrow problem inherent in the identity based cryptography and cumbersome certificate management in the traditional public key infrastructure.
openaire +1 more source
Secret key agreement by public discussion from common information
IEEE Transactions on Information Theory, 1993U. Maurer
semanticscholar +1 more source

