Results 261 to 270 of about 561,825 (309)
Some of the next articles are maybe not open access.
Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing, 2017
As the world is becoming more and more connected, managing security of the network system is becoming more difficult. One of the ways to ensure security is by encrypting the data and in order to do so, the encryption key needs to be exchanged between the devices trying to communicate with each other.
Siddharth Gupta +2 more
openaire +1 more source
As the world is becoming more and more connected, managing security of the network system is becoming more difficult. One of the ways to ensure security is by encrypting the data and in order to do so, the encryption key needs to be exchanged between the devices trying to communicate with each other.
Siddharth Gupta +2 more
openaire +1 more source
Deniable authentication and key exchange
Proceedings of the 13th ACM conference on Computer and communications security, 2006We extend the definitional work of Dwork,Naor and Sahai from deniable authentication to deniable key-exchange protocols. We then use these definitions to prove the deniability features of SKEME and SIGMA, two natural and efficient protocols which serve as basis for the Internet Key Exchange (IKE)protocol.SKEME is an encryption-based protocol for which ...
DI RAIMONDO, MARIO +2 more
openaire +1 more source
Bi-symmetric Key Exchange: A Novel Cryptographic Key Exchanging Algorithm
2018The most sensitive part of any crypto graphical system is ensuring the security of key exchange. Classical crypto graphical algorithms make use of one-way complex mathematical functions, to encode the key. On the other hand, Quantum crypto graphical systems make use of Q-bits or photons to encode the key.
Shekhar Sonthalia +2 more
openaire +1 more source
Unilaterally-Authenticated Key Exchange
2017Key Exchange (KE), which enables two parties (e.g., a client and a server) to securely establish a common private key while communicating over an insecure channel, is one of the most fundamental cryptographic primitives. In this work, we address the setting of unilaterally-authenticated key exchange (UAKE), where an unauthenticated (unkeyed) client ...
Yevgeniy Dodis, Dario Fiore
openaire +1 more source
Group Key Exchange Compilers fromĀ Generic Key Exchanges
2021Hector B. Hougaard, Atsuko Miyaji
openaire +1 more source

