Authentication and Key Agreement

Results: 30



#Item
1A Session Mix-up Attack on the UMTS/LTE Authentication and Key Agreement Protocols Short talk at IEEE Computer Security Foundations Symposium Cambridge MA, June 26, 2012  Stig F. Mjølsnes

A Session Mix-up Attack on the UMTS/LTE Authentication and Key Agreement Protocols Short talk at IEEE Computer Security Foundations Symposium Cambridge MA, June 26, 2012 Stig F. Mjølsnes

Add to Reading List

Source URL: csf2012.seas.harvard.edu

Language: English - Date: 2012-07-05 18:15:12
    2ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

    ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

    Add to Reading List

    Source URL: www.ijmetmr.com

    Language: English - Date: 2015-01-23 01:39:57
    3SAS-Based Group Authentication and Key Agreement Protocols Sven Laur1? and Sylvain Pasini2?? 1  Helsinki University of Technology, Finland

    SAS-Based Group Authentication and Key Agreement Protocols Sven Laur1? and Sylvain Pasini2?? 1 Helsinki University of Technology, Finland

    Add to Reading List

    Source URL: lepo.it.da.ut.ee

    Language: English - Date: 2007-12-10 05:34:48
      4Authentication and Key Agreement via Memorable Password Taekyoung Kwon University of California, Berkeley  or  Updated on August 20, 2000

      Authentication and Key Agreement via Memorable Password Taekyoung Kwon University of California, Berkeley or Updated on August 20, 2000

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2000-08-23 06:08:21
        51  Distributed Collaborative Key Agreement and Authentication Protocols for Dynamic Peer Groups Patrick P. C. Lee, John C. S. Lui, and David K. Y. Yau

        1 Distributed Collaborative Key Agreement and Authentication Protocols for Dynamic Peer Groups Patrick P. C. Lee, John C. S. Lui, and David K. Y. Yau

        Add to Reading List

        Source URL: www.cs.cuhk.hk

        Language: English - Date: 2005-06-19 23:01:08
        6Designs, Codes and Cryptography manuscript No. (will be inserted by the editor) Anonymity and one-way authentication in key exchange protocols Ian Goldberg · Douglas Stebila ·

        Designs, Codes and Cryptography manuscript No. (will be inserted by the editor) Anonymity and one-way authentication in key exchange protocols Ian Goldberg · Douglas Stebila ·

        Add to Reading List

        Source URL: www.cypherpunks.ca

        Language: English - Date: 2012-01-13 10:28:23
        7Anonymity and one-way authentication in key exchange protocols Ian Goldberg1 , Douglas Stebila2 , and Berkant Ustaoglu3 1: Cheriton School of Computer Science, University of Waterloo, Waterloo, Ontario, Canada 2: Informa

        Anonymity and one-way authentication in key exchange protocols Ian Goldberg1 , Douglas Stebila2 , and Berkant Ustaoglu3 1: Cheriton School of Computer Science, University of Waterloo, Waterloo, Ontario, Canada 2: Informa

        Add to Reading List

        Source URL: cacr.uwaterloo.ca

        Language: English - Date: 2012-01-15 19:52:05
        8Authentication and Key Agreement via Memorable Password Taekyoung Kwon  Abstract  them, the knowledge-based scheme is aimed for

        Authentication and Key Agreement via Memorable Password Taekyoung Kwon Abstract them, the knowledge-based scheme is aimed for

        Add to Reading List

        Source URL: www.isoc.org

        Language: English - Date: 2001-07-20 00:20:35
        9NEWS RELEASE  IDEX and BIO-key Sign License Agreement to Deliver Advanced Biometric Solutions for Mobility Market The agreement will provide the next generation of secure identification solutions for mass market consumer

        NEWS RELEASE IDEX and BIO-key Sign License Agreement to Deliver Advanced Biometric Solutions for Mobility Market The agreement will provide the next generation of secure identification solutions for mass market consumer

        Add to Reading List

        Source URL: www.bio-key.com

        Language: English - Date: 2014-03-31 02:48:28
        10A weakness in Sun-Chen-Hwang’s three-party key agreement protocols using passwords ? Junghyun Nam, Seungjoo Kim, Dongho Won, School of Information and Communication Engineering, Sungkyunkwan University, 300 Cheoncheon-

        A weakness in Sun-Chen-Hwang’s three-party key agreement protocols using passwords ? Junghyun Nam, Seungjoo Kim, Dongho Won, School of Information and Communication Engineering, Sungkyunkwan University, 300 Cheoncheon-

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2004-12-13 20:50:57