Key-agreement protocol

Results: 124



#Item
81Cryptographic protocols / Internet protocols / Internet standards / Revocation list / Public key certificate / Online Certificate Status Protocol / Certificate authority / Warranty / X.509 / Cryptography / Public-key cryptography / Key management

InCommon Certificate Service Relying Party Standard Form Agreement 24 June[removed]InCommon Certificate Service Relying Party Agreement

Add to Reading List

Source URL: www.alaska.edu

Language: English - Date: 2011-01-21 13:18:06
82XKMS / Kerberos / Key-agreement protocol / Shared secret / Key / Public key infrastructure / Index of cryptography articles / MIKEY / Cryptography / Cryptographic protocols / Public-key cryptography

PDF Document

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2001-12-10 20:16:57
83Information / Internet Key Exchange / Station-to-Station protocol / IPsec / Key-agreement protocol / Internet Security Association and Key Management Protocol / Internet security / Diffie–Hellman key exchange / Online Certificate Status Protocol / Cryptographic protocols / Cryptography / Data

Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols ∗ William Aiello AT&T Labs Research

Add to Reading List

Source URL: www.crypto.com

Language: English - Date: 2003-02-16 21:33:47
84Diffie–Hellman key exchange / Public-key cryptography / Internet Key Exchange / Shared secret / Public key infrastructure / Elliptic curve Diffie–Hellman / MQV / Cryptography / Cryptographic protocols / Key-agreement protocol

Deniable Authenticated Key Establishment for Internet Protocols Colin Boyd1? and Wenbo Mao2?? and Kenneth G. Paterson3? ? ? 1 Information Security Research Centre, Queensland University of Technology,

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2004-04-22 14:15:54
85Password-authenticated key agreement / Password / Diffie–Hellman key exchange / Man-in-the-middle attack / IEEE P1363 / XTR / Password Authenticated Key Exchange by Juggling / Cryptographic protocols / Cryptography / SPEKE

The SPEKE Protocol Revisited Feng Hao, Siamak F. Shahandashti Newcastle University, UK {feng.hao, siamak.shahandashti}@ncl.ac.uk Abstract. The SPEKE protocol is commonly considered one of the classic Password Authentica

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-25 17:34:38
86Cryptographic protocols / Internet protocols / Internet standards / Revocation list / Public key certificate / Online Certificate Status Protocol / Certificate authority / Warranty / X.509 / Cryptography / Public-key cryptography / Key management

InCommon Certificate Service Relying Party Standard Form Agreement 24 June[removed]InCommon Certificate Service Relying Party Agreement

Add to Reading List

Source URL: info.alaska.edu

Language: English - Date: 2011-01-21 13:18:06
87Public-key cryptography / Undeniable signature / Cryptographic protocol / Random oracle / Forking lemma / Ring signature / Key-agreement protocol / RSA / Group signature / Cryptography / Digital signature / Designated verifier signature

Special Signature Schemes and Key Agreement Protocols Caroline J. Kudla Thesis submitted to the University of London for the degree of Doctor of Philosophy

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2006-05-22 10:47:54
88Key management / Secure communication / Public key infrastructure / Grid Security Infrastructure / Key-agreement protocol / X.509 / Transport Layer Security / Key exchange / Diffie–Hellman key exchange / Cryptography / Cryptographic protocols / Public-key cryptography

On the Application of Identity-Based Cryptography in Grid Security Hoon Wei Lim Thesis submitted to the University of London for the degree of Doctor of Philosophy

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2006-05-02 10:04:49
89MQV / Key-agreement protocol / Diffie–Hellman key exchange / Perfect forward secrecy / Digital signature / Diffie–Hellman problem / Whitfield Diffie / Cryptography / Cryptographic protocols / Public-key cryptography

Cryptographic Schemes based on Elliptic Curve Pairings Sattam S. Al-Riyami Thesis submitted to the University of London for the degree of Doctor of Philosophy

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2004-06-16 10:55:54
UPDATE