Key-agreement protocol

Results: 124



#Item
11

An Identity-Based Key Agreement Protocol for the Network Layer Christian Schridde, Matthew Smith, and Bernd Freisleben Department of Mathematics and Computer Science, University of Marburg Hans-Meerwein-Str. 3, DM

Add to Reading List

Source URL: www.dcsec.uni-hannover.de

Language: English - Date: 2010-11-03 12:17:51
    12Cryptography / Key management / Shared secret / Cryptographic protocol / Challengeresponse authentication / Key-agreement protocol

    Secure Protocol Composition Anupam Datta John C. Mitchell Ante Derek Dusko Pavlovic

    Add to Reading List

    Source URL: seclab.stanford.edu

    Language: English - Date: 2010-07-17 01:14:11
    13Cryptography / Cryptographic protocols / Transport Layer Security / Public-key cryptography / Wireless / Secure communication / Man-in-the-middle attack / Bluetooth / Key-agreement protocol / HTTPS / Password / Transmission Control Protocol

    PDF Document

    Add to Reading List

    Source URL: www.netsec.ethz.ch

    Language: English - Date: 2015-06-01 09:06:14
    14Key-agreement protocol / Received signal strength indication / Information theory / Cryptographic protocols / Information / Data

    On the Possibility of Key Agreement Using Variable Directional Antenna Hideki Imai12 , Kazukuni Kobara21 , and Kirill Morozov21 1 2

    Add to Reading List

    Source URL: imi.kyushu-u.ac.jp

    Language: English - Date: 2007-02-07 16:57:52
    15

    Provable Secure Constant-Round Group Key Agreement Protocol based on Secret Sharing Ruxandra F. Olimid Department of Computer Science, University of Bucharest, Romania

    Add to Reading List

    Source URL: ruxandraolimid.weebly.com

    Language: English - Date: 2013-11-02 15:03:34
      16Information / NSA Suite B Cryptography / Internet Key Exchange / IPsec / Elliptic curve cryptography / Elliptic curve Diffie–Hellman / Elliptic Curve DSA / Key-agreement protocol / Diffie–Hellman key exchange / Cryptographic protocols / Cryptography / Data

      Internet Engineering Task Force (IETF) Request for Comments: 6380 Category: Informational ISSN: K. Burgin

      Add to Reading List

      Source URL: www.rfc-editor.org

      Language: English - Date: 2011-10-18 14:31:43
      17United Nations Framework Convention on Climate Change / Carbon finance / Carbon dioxide / Earth / Climate change mitigation / Kyoto Protocol / Global warming / Kyoto Protocol and government action / Greenhouse gas emissions by the United States / Environment / Climate change policy / Climate change

      Japan Should Quickly Ratify the Kyoto Protocol! ∼ Early action is beneficial to Japanese economy ∼ In July 2001 the Bonn Agreement was reached. Japan, which holds the key to bringing the Kyoto Protocol into force, mu

      Add to Reading List

      Source URL: www.kikonet.org

      Language: English - Date: 2014-08-31 08:17:16
      18Security / Password-authenticated key agreement / Key-agreement protocol / Public-key cryptography / Transport Layer Security / Perfect forward secrecy / Authentication protocol / Authentication / Kerberos / Cryptographic protocols / Cryptography / Data

      Designs, Codes and Cryptography manuscript No. (will be inserted by the editor) Anonymity and one-way authentication in key exchange protocols Ian Goldberg · Douglas Stebila ·

      Add to Reading List

      Source URL: www.cypherpunks.ca

      Language: English - Date: 2012-01-13 10:28:23
      19Data / Password-authenticated key agreement / Key-agreement protocol / Public-key cryptography / Transport Layer Security / Authentication / Perfect forward secrecy / HTTP Secure / Kerberos / Cryptographic protocols / Cryptography / Security

      Anonymity and one-way authentication in key exchange protocols Ian Goldberg1 , Douglas Stebila2 , and Berkant Ustaoglu3 1: Cheriton School of Computer Science, University of Waterloo, Waterloo, Ontario, Canada 2: Informa

      Add to Reading List

      Source URL: cacr.uwaterloo.ca

      Language: English - Date: 2012-01-15 19:52:05
      20Public-key cryptography / Diffie–Hellman key exchange / Key-agreement protocol / Key management / Virtual synchrony / XTR / Key exchange / Secure channel / SPEKE / Cryptographic protocols / Information / Computing

      On the Performance of Group Key Agreement Protocols  Yair Amir 

      Add to Reading List

      Source URL: www.cnds.jhu.edu

      Language: English - Date: 2013-09-18 16:37:35
      UPDATE