<--- Back to Details
First PageDocument Content
Cryptography / Notary / Public-key cryptography / Computer access control / Proxy Mobile IPv6 / Authentication / Secret sharing / Digital signature / Encryption / Resultant
Date: 2012-02-11 16:01:44
Cryptography
Notary
Public-key cryptography
Computer access control
Proxy Mobile IPv6
Authentication
Secret sharing
Digital signature
Encryption
Resultant

EM 3A: Efficient Mutual Multi-hop Mobile Authentication Scheme for PMIP Networks Sanaa Taha∗ , Sandra C´espedes∗† , and Xuemin (Sherman) Shen∗ ∗ Department of Electrical and Computer Engineering, University of

Add to Reading List

Source URL: www.cec.uchile.cl

Download Document from Source Website

File Size: 449,80 KB

Share Document on Facebook

Similar Documents

Notary Commission Application

Notary Commission Application

DocID: 1xVSN - View Document

Notary commission guide 2017.indd

Notary commission guide 2017.indd

DocID: 1xTQd - View Document

Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services Georg Merzdovnik1 , Klaus Falb2 , Martin Schmiedecker1 , Artemios G. Voyiatzis1,2 , and Edgar Weippl1,2 1

Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services Georg Merzdovnik1 , Klaus Falb2 , Martin Schmiedecker1 , Artemios G. Voyiatzis1,2 , and Edgar Weippl1,2 1

DocID: 1vgMu - View Document

Four-Year Notary Public Commission Application

Four-Year Notary Public Commission Application

DocID: 1veLC - View Document

Open-Transactions: Secure Contracts between Untrusted Parties Chris Odom  Abstract A low-trust notary could replace conventional transaction servers and would allow users to gain access to safe,

Open-Transactions: Secure Contracts between Untrusted Parties Chris Odom Abstract A low-trust notary could replace conventional transaction servers and would allow users to gain access to safe,

DocID: 1v1O0 - View Document