Results 111 to 120 of about 401,573 (156)
Some of the next articles are maybe not open access.

A simple key agreement protocol

IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings., 2004
We propose a simple key agreement protocol(SKA) that provides key establishment with authentication over an insecure channel using only a human memorable password. The SKA is based on Diffie-Hellman scheme and has many of desirable security attributes: it resists off-line dictionary attacks mounted by either passive or active adversaries over network ...
null Eun-Kyung Ryu   +2 more
openaire   +1 more source

Cryptographic Key Agreement Protocol Simulation

2010 Sixth International Conference on Semantics, Knowledge and Grids, 2010
The High Assurance Internet Protocol Encrypt or (HAIPE) Interoperability Specification is developed by the US Department of Defense to permit enclaves equipped with compliant gateways to communicate securely over un-trusted networks. Using Cryptographic Key Agreement protocol, e.g., Internet Key Exchange (IKE), HAIPEs can establish automated security ...
Zhang Chuan-fu   +3 more
openaire   +1 more source

New authenticated key agreement protocols

The 2011 International Conference on Computer Engineering & Systems, 2011
Key agreement protocols are used to establish common keys between two or more entities. The established key can then be used to assure confidentiality of exchanged messages through encryption. Additionally, authenticated key agreement protocols offer implicit authentication.
Hassan M. Elkamchouchi   +2 more
openaire   +1 more source

An Efficient Protocol for Authenticated Key Agreement

Designs, Codes and Cryptography, 2003
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Law, Laurie   +4 more
openaire   +1 more source

Certificateless Key Agreement Protocol

2010 2nd International Conference on E-business and Information System Security, 2010
Certificateless cryptography aims at combining the advantages of identity based and public key cryptography in order to avoid the key escrow problem inherent in the identity based cryptography and cumbersome certificate management in the traditional public key infrastructure.
openaire   +1 more source

An Improved Conference Key Agreement Protocol

2008 International Conference on Computational Intelligence and Security, 2008
A conference-key protocol is used to establish a common conference key K such that a group of people can communicate securely over a public network. To improve the implementation efficiency of Tzeng?s conference-key agreement protocol, an efficient conference-key agreement protocol is proposed under the authenticated broadcast channel.
Xing-lan Zhang, Quan-min Wang
openaire   +1 more source

Improved authenticated multi-key agreement protocol

Wuhan University Journal of Natural Sciences, 2006
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Zhang, Hua, Yuan, Zheng, Wen, Qiaoyan
openaire   +2 more sources

Secure Group Key Agreement Protocols

2018
This chapter focusses on Secure Key Exchange protocols executed among a group of parties, called group key exchange (GKE) protocols. Authentication and Key Establishment are very important in any secure communication. Authentication is generally based on long-term keys which can be associated with identities. To associate identities with long-term keys,
Kannan Balasubramanian, Mala K.
openaire   +1 more source

An improved authenticated key agreement protocol

Journal of Electronics (China), 2005
In 1999, Seo and Sweeney proposed a simple authenticated key agreement protocol that was designed to act as a Diffie-Hellman key agreement protocol with user authentication. Various attacks on this protocol are described and enhanced in the literature. Recently, Ku and Wang proposed an improved authenticated key agreement protocol, where they asserted ...
Changji Wang, Bo Yang, Jianping Wu
openaire   +1 more source

Certificateless Two Party Key Agreement Protocol

2010 International Conference on Multimedia Information Networking and Security, 2010
Certificateless cryptography aims at combining the advantages of identity based and public key cryptography in order to avoid the key escrow problem inherent in the identity based cryptography and cumbersome certificate management in the traditional public key infrastructure.
Liu Wenhao, Xu Chunxiang, Xu Jian
openaire   +1 more source

Home - About - Disclaimer - Privacy