Shared secret

Results: 29



#Item
21XKMS / Kerberos / Key-agreement protocol / Shared secret / Key / Public key infrastructure / Index of cryptography articles / MIKEY / Cryptography / Cryptographic protocols / Public-key cryptography

PDF Document

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2001-12-10 20:16:57
22Diffie–Hellman key exchange / Public-key cryptography / Internet Key Exchange / Shared secret / Public key infrastructure / Elliptic curve Diffie–Hellman / MQV / Cryptography / Cryptographic protocols / Key-agreement protocol

Deniable Authenticated Key Establishment for Internet Protocols Colin Boyd1? and Wenbo Mao2?? and Kenneth G. Paterson3? ? ? 1 Information Security Research Centre, Queensland University of Technology,

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2004-04-22 14:15:54
23Shared secret / Public-key cryptography / Key-agreement protocol / Transport Layer Security / Provisioning / Authentication / Cryptography / Cryptographic protocols / XKMS

http://www.openauthentication.org/drafts/draft-hallambaker-oa...

Add to Reading List

Source URL: www.openauthentication.org

Language: English - Date: 2013-11-05 02:26:07
24Science and technology in the United States / Cooperative Research and Development Agreement / National Renewable Energy Laboratory / Title 35 of the United States Code / Patent / Inventor / Integrated circuit layout design protection / Trade secret / United States patent law / Intellectual property law / Patent law / Law

Shared Resources Cooperative Research and Development Agreement

Add to Reading List

Source URL: www.nrel.gov

Language: English - Date: 2010-01-08 16:21:58
25Diffie–Hellman key exchange / Public-key cryptography / Key exchange / Shared secret / Man-in-the-middle attack / Interlock protocol / Cryptography / Cryptographic protocols / Off-the-Record Messaging

Finite-State Security Analysis of OTR Version 2 Joseph Bonneau

Add to Reading List

Source URL: www.jbonneau.com

Language: English - Date: 2014-05-03 16:10:02
26Diffie–Hellman key exchange / Public-key cryptography / Key exchange / Shared secret / Man-in-the-middle attack / Interlock protocol / Cryptography / Cryptographic protocols / Off-the-Record Messaging

Finite-State Security Analysis of OTR Version 2 Joseph Bonneau

Add to Reading List

Source URL: www.stanford.edu

Language: English - Date: 2006-03-21 17:10:20
27Diffie–Hellman key exchange / Public-key cryptography / Key exchange / Shared secret / Man-in-the-middle attack / Interlock protocol / Cryptography / Cryptographic protocols / Off-the-Record Messaging

Finite-State Security Analysis of OTR Version 2 Joseph Bonneau

Add to Reading List

Source URL: seclab.stanford.edu

Language: English - Date: 2006-03-21 17:10:20
28Shared secret / Burrows–Abadi–Needham logic / Password-authenticated key agreement / Cryptography / Cryptographic protocols / Public-key cryptography

PDF Document

Add to Reading List

Source URL: www.hpl.hp.com

Language: English - Date: 2007-10-21 18:30:02
29Shared secret / Burrows–Abadi–Needham logic / Password-authenticated key agreement / Cryptography / Cryptographic protocols / Public-key cryptography

PDF Document

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2001-02-05 06:18:08
UPDATE