Authentication and Key Agreement

Results: 30



#Item
1

A Session Mix-up Attack on the UMTS/LTE Authentication and Key Agreement Protocols Short talk at IEEE Computer Security Foundations Symposium Cambridge MA, June 26, 2012 Stig F. Mjølsnes

Add to Reading List

Source URL: csf2012.seas.harvard.edu

Language: English - Date: 2012-07-05 18:15:12
    2Wireless networking / Wireless sensor network / Cryptographic protocols / Key management / Code division multiple access / Bootstrapping Server Function / Key distribution / Generic Bootstrapping Architecture / Authentication and Key Agreement / ZigBee / Lightweight Extensible Authentication Protocol / ANT

    ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

    Add to Reading List

    Source URL: www.ijmetmr.com

    Language: English - Date: 2015-01-23 01:39:57
    3

    SAS-Based Group Authentication and Key Agreement Protocols Sven Laur1? and Sylvain Pasini2?? 1 Helsinki University of Technology, Finland

    Add to Reading List

    Source URL: lepo.it.da.ut.ee

    Language: English - Date: 2007-12-10 05:34:48
      4

      Authentication and Key Agreement via Memorable Password Taekyoung Kwon University of California, Berkeley or Updated on August 20, 2000

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2000-08-23 06:08:21
        5Rekeying / Data management / Computing / Graph theory / B-tree / R-tree / Binary tree

        1 Distributed Collaborative Key Agreement and Authentication Protocols for Dynamic Peer Groups Patrick P. C. Lee, John C. S. Lui, and David K. Y. Yau

        Add to Reading List

        Source URL: www.cs.cuhk.hk

        Language: English - Date: 2005-06-19 23:01:08
        6Security / Password-authenticated key agreement / Key-agreement protocol / Public-key cryptography / Transport Layer Security / Perfect forward secrecy / Authentication protocol / Authentication / Kerberos / Cryptographic protocols / Cryptography / Data

        Designs, Codes and Cryptography manuscript No. (will be inserted by the editor) Anonymity and one-way authentication in key exchange protocols Ian Goldberg · Douglas Stebila ·

        Add to Reading List

        Source URL: www.cypherpunks.ca

        Language: English - Date: 2012-01-13 10:28:23
        7Data / Password-authenticated key agreement / Key-agreement protocol / Public-key cryptography / Transport Layer Security / Authentication / Perfect forward secrecy / HTTP Secure / Kerberos / Cryptographic protocols / Cryptography / Security

        Anonymity and one-way authentication in key exchange protocols Ian Goldberg1 , Douglas Stebila2 , and Berkant Ustaoglu3 1: Cheriton School of Computer Science, University of Waterloo, Waterloo, Ontario, Canada 2: Informa

        Add to Reading List

        Source URL: cacr.uwaterloo.ca

        Language: English - Date: 2012-01-15 19:52:05
        8Computer security / Password / SPEKE / Salt / Key-agreement protocol / Replay attack / Password-authenticated key agreement / Secure Remote Password protocol / Cryptographic protocols / Cryptography / Security

        Authentication and Key Agreement via Memorable Password Taekyoung Kwon Abstract them, the knowledge-based scheme is aimed for

        Add to Reading List

        Source URL: www.isoc.org

        Language: English - Date: 2001-07-20 00:20:35
        9Access control / Biometrics / Identity management / Multi-factor authentication / Fingerprint recognition / Fingerprint / Authentication / Two-factor authentication / Security / Identification / Fingerprints

        NEWS RELEASE IDEX and BIO-key Sign License Agreement to Deliver Advanced Biometric Solutions for Mobility Market The agreement will provide the next generation of secure identification solutions for mass market consumer

        Add to Reading List

        Source URL: www.bio-key.com

        Language: English - Date: 2014-03-31 02:48:28
        10Public-key cryptography / Password authentication protocol / Key-agreement protocol / Password / Secure Remote Password protocol / Cryptographic protocols / Cryptography / Encrypted key exchange

        A weakness in Sun-Chen-Hwang’s three-party key agreement protocols using passwords ? Junghyun Nam, Seungjoo Kim, Dongho Won, School of Information and Communication Engineering, Sungkyunkwan University, 300 Cheoncheon-

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2004-12-13 20:50:57
        UPDATE