Authentication protocol

Results: 881



#Item
111

暗号プロトコル評価対象の概要 独立行政法人 情報通信研究機構 1. プ ロ ト コ ル 名 : Extensible Authentication Protocol Method for 3rd Generation Authentication

Add to Reading List

Source URL: crypto-protocol.nict.go.jp

Language: Japanese - Date: 2015-10-20 00:24:04
    112Cryptography / Protocol composition logic / Authentication protocols / BurrowsAbadiNeedham logic / Communications protocol / Kerberos / Public-key cryptography / Cryptographic protocol

    A. Datta et al. / Protocol Composition Logic 1 Protocol Composition Logic Anupam DATTA a , John C. MITCHELL b , Arnab ROY b and

    Add to Reading List

    Source URL: seclab.stanford.edu

    Language: English - Date: 2010-07-17 01:14:08
    113Cryptography / Authentication protocols / Computer network security / Ciphertext indistinguishability / DolevYao model / Advantage / Kerberos / Cryptographic protocol / Security parameter / XTR / Challengeresponse authentication / Security protocol notation

    Inductive Proof Method for Computational Secrecy Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell Department of Computer Science, Stanford University Abstract. We investigate inductive methods for proving secrecy p

    Add to Reading List

    Source URL: seclab.stanford.edu

    Language: English - Date: 2010-07-17 01:14:15
    114

    Analysis of EAP-GPSK Authentication Protocol John C. Mitchell1 , Arnab Roy1 and Paul Rowe2 , Andre Scedrov2 1 2

    Add to Reading List

    Source URL: seclab.stanford.edu

    Language: English - Date: 2010-07-20 20:53:54
      115Authentication protocols / Symmetric-key cryptography / Computer network security / IP / Kerberos / NeedhamSchroeder protocol / Cryptography

      Secrecy Analysis in Protocol Composition Logic? Arnab Roy1 , Anupam Datta1 , Ante Derek1 , John C. Mitchell1 , Jean-Pierre Seifert2 1 2

      Add to Reading List

      Source URL: seclab.stanford.edu

      Language: English - Date: 2010-07-17 01:14:15
      116Cryptography / Key management / Shared secret / Cryptographic protocol / Challengeresponse authentication / Key-agreement protocol

      Secure Protocol Composition Anupam Datta John C. Mitchell Ante Derek Dusko Pavlovic

      Add to Reading List

      Source URL: seclab.stanford.edu

      Language: English - Date: 2010-07-17 01:14:11
      117Transport Layer Security / Key management / Public key infrastructure / Public-key cryptography / Certificate authority / Public key certificate / Root certificate / Extended Validation Certificate / X.509 / Online Certificate Status Protocol / Self-signed certificate / DNS-based Authentication of Named Entities

      Accountable Key Infrastructure (AKI): ∗ A Proposal for a Public-Key Validation Infrastructure Tiffany Hyun-Jin Kim Lin-Shung Huang Adrian Perrig Collin Jackson Virgil Gligor CyLab / Carnegie Mellon University

      Add to Reading List

      Source URL: www.netsec.ethz.ch

      Language: English - Date: 2015-06-01 09:06:13
      118

      暗号プロトコル評価対象の概要 独立行政法人 情報通信研究機構 1.プロトコル名:Kerberos Basic 2.関連する標準:R・RFC4120 (The Kerberos Network Authentication Se

      Add to Reading List

      Source URL: crypto-protocol.nict.go.jp

      Language: Japanese - Date: 2015-10-20 00:24:04
        119Cryptography / Public-key cryptography / Authentication protocols / Symmetric-key cryptography / NeedhamSchroeder protocol / Cryptographic nonce / XTR / Digital signature / Subtyping / Security protocol notation

        Types and Effects for Asymmetric Cryptographic Protocols Andrew D. Gordon Microsoft Research Cambridge, UK Alan Jeffrey

        Add to Reading List

        Source URL: ect.bell-labs.com

        Language: English - Date: 2010-12-15 21:36:15
        UPDATE