Results 181 to 190 of about 12,317,693 (236)
Some of the next articles are maybe not open access.

Tunable Group Key Agreement

32nd IEEE Conference on Local Computer Networks (LCN 2007), 2007
Secure group communication has various applications. Requirements for an application differ in various parameters such as tolerance times for join and leave, arrival rate, departure rate, staying period and group life time. Existing group key agreement protocols do not harness knowledge of application requirements.
INGLE, RAJESH, SIVAKUMAR, G
openaire   +2 more sources

A provably-secure authenticated key agreement protocol for remote patient monitoring IoMT

Journal of systems architecture, 2023
Chien-Ming Chen   +4 more
semanticscholar   +1 more source

Blockchain-assisted authenticated key agreement scheme for IoT-based healthcare system

Internet of Things, 2023
Ashish Tomar   +3 more
semanticscholar   +1 more source

Quantum Conference Key Agreement

2021
Quantum conference key agreement (CKA) extends the notion of quantum key distribution (QKD) to the multipartite scenario. We introduce CKA in Sect. 4.1 and present the multipartite generalization of the BB84 protocol, including insight on its security proof and asymptotic key rate. In Sect.
openaire   +1 more source

Key Agreement

2021
Mike Just, Carlisle Adams
openaire   +1 more source

Deniable Group Key Agreement

2006
Especially for key establishment protocols to be used in internet applications, the (privacy) concern of deniability arises: Can a protocol transcript be used—possibly by a participant—to prove the involvement of another party in the protocol? For two party key establishment protocols, a common technique for achieving deniability is the replacement of ...
Jens-Matthias Bohli, Rainer Steinwandt
openaire   +1 more source

Certificates, Key Transport and Key Agreement

2015
We can now perform encryption and authentication using either public key techniques or symmetric key techniques. However, we have not addressed how parties actually obtain the public key of an entity, or obtain a shared symmetric key. When using hybrid ciphers in Section 16.3 we showed how a symmetric key could be transported to another party, and then
openaire   +1 more source

Certificateless Key Agreement Protocol

2010 2nd International Conference on E-business and Information System Security, 2010
Certificateless cryptography aims at combining the advantages of identity based and public key cryptography in order to avoid the key escrow problem inherent in the identity based cryptography and cumbersome certificate management in the traditional public key infrastructure.
openaire   +1 more source

Home - About - Disclaimer - Privacy