Deniable authentication

Results: 15



#Item
1Cryptographic protocols / Public-key cryptography / Notary / Online chat / Internet protocols / Deniable authentication / XMPP / Off-the-Record Messaging / Authentication / Digital signature / Key exchange / Transport Layer Security

Improved Group Off-the-Record Messaging Hong Liu Eugene Y. Vasserman Nicholas Hopper

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2013-09-04 15:59:08
2

POSTER: Deniable Anonymous Group Authentication Ewa Syta Ph.D. Student Yale University Email:

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2013-05-17 10:01:42
    3Burrows–Abadi–Needham logic / Belief revision / Epistemic modal logic / Communications protocol / Deniable authentication / IP / Cryptographic protocols / Data / Information

    Belief Change and Cryptographic Protocol Verification Aaron Hunter and James P. Delgrande School of Computing Science Simon Fraser University Burnaby, BC, Canada {amhunter, jim}@cs.sfu.ca

    Add to Reading List

    Source URL: www.cs.sfu.ca

    Language: English - Date: 2008-05-19 14:54:15
    4Key management / Deniable authentication / Ring signature / Digital signature / Authenticated encryption / Zero-knowledge proof / Proof of knowledge / Cryptography / Cryptographic protocols / Public-key cryptography

    Microsoft Word - DA standarden.doc

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2011-12-20 21:30:21
    5Internet privacy / Cryptographic software / Off-the-Record Messaging / Diffie–Hellman key exchange / Key exchange / Man-in-the-middle attack / Deniable authentication / Digital signature / SecureIM / Cryptography / Cryptographic protocols / Public-key cryptography

    Off-the-Record Communication, or, Why Not To Use PGP Nikita Borisov UC Berkeley Ian Goldberg

    Add to Reading List

    Source URL: www.cypherpunks.ca

    Language: English - Date: 2004-12-12 23:04:41
    6Deniable authentication / Off-the-Record Messaging / Diffie–Hellman key exchange / Cryptographic hash function / Alice and Bob / Digital signature / Cryptography / Cryptographic protocols / Public-key cryptography

    Multi-party Off-the-Record Messaging Ian Goldberg ˘ Berkant Ustaoglu

    Add to Reading List

    Source URL: www.cypherpunks.ca

    Language: English - Date: 2009-08-01 14:09:59
    7Computer security / Computer network security / Security service / Non-repudiation / Public key infrastructure / Deniable authentication / Plausible deniability / Key-agreement protocol / Information security / Cryptography / Public-key cryptography / Cryptographic protocols

    Cryptography and Evidence Michael Roe Clare College A dissertation submitted for the degree of Doctor of Philosophy in the University of Cambridge

    Add to Reading List

    Source URL: www.chiark.greenend.org.uk

    Language: English - Date: 1999-08-17 09:51:55
    8Information / Public-key cryptography / Electronic commerce / Secure communication / PKCS / Smart card / Communications protocol / Secure Electronic Transaction / Deniable authentication / Cryptography / Cryptographic protocols / Data

    Making Sense of Specifications: the Formalization of SET (Extended Abstract) Giampaolo Bella1 , Fabio Massacci2,3 , Lawrence C. Paulson1 , and Piero Tramontano3 1

    Add to Reading List

    Source URL: www.ing.unitn.it

    Language: English - Date: 2004-10-19 21:06:10
    9Burrows–Abadi–Needham logic / Needham–Schroeder protocol / Public-key cryptography / Cryptographic nonce / XTR / Deniable authentication / Security protocol notation / Wide Mouth Frog protocol / Cryptographic protocols / Cryptography / Data

    NRL Release Number[removed]The Logic of Authentication Protocols ?

    Add to Reading List

    Source URL: www.nrl.navy.mil

    Language: English - Date: 2013-04-29 11:09:46
    10Deniable encryption / Deniable authentication / ID-based encryption / Digital signature / Commitment scheme / Zero-knowledge proof / RSA / Integrated Encryption Scheme / Index of cryptography articles / Cryptography / Public-key cryptography / Cryptographic protocols

    Deniable Ring Authentication∗ Moni Naor Weizmann Institute of Science Rehovot 76100, Israel [removed]

    Add to Reading List

    Source URL: www.wisdom.weizmann.ac.il

    Language: English - Date: 2002-06-03 03:07:12
    UPDATE