Encrypted key exchange

Results: 12



#Item
1Oblivious PAKE: Efficient Handling of Password Trials F. Kiefer, M. Manulis

Oblivious PAKE: Efficient Handling of Password Trials F. Kiefer, M. Manulis

Add to Reading List

Source URL: isc2015.item.ntnu.no

Language: English - Date: 2015-09-19 12:50:59
2

PDF Document

Add to Reading List

Source URL: grouper.ieee.org

Language: English - Date: 2008-04-27 09:53:57
3c ACM, 2006. This is the author’s version of the work. It is posted here by permission of ACM for your personal use. 
 Not for redistribution. The definitive version was published in Proceedings of the 2006 ACM Symposi

c ACM, 2006. This is the author’s version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in Proceedings of the 2006 ACM Symposi

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2006-05-22 09:04:49
4A weakness in Sun-Chen-Hwang’s three-party key agreement protocols using passwords ? Junghyun Nam, Seungjoo Kim, Dongho Won, School of Information and Communication Engineering, Sungkyunkwan University, 300 Cheoncheon-

A weakness in Sun-Chen-Hwang’s three-party key agreement protocols using passwords ? Junghyun Nam, Seungjoo Kim, Dongho Won, School of Information and Communication Engineering, Sungkyunkwan University, 300 Cheoncheon-

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-13 20:50:57
5The Second International Conference on Sensor Technologies and Applications  Simultaneous Authentication of Equals: A Secure, Password-Based Key Exchange for Mesh Networks Dan Harkins Aruba Networks

The Second International Conference on Sensor Technologies and Applications Simultaneous Authentication of Equals: A Secure, Password-Based Key Exchange for Mesh Networks Dan Harkins Aruba Networks

Add to Reading List

Source URL: www.q.hscott.net

Language: English - Date: 2014-01-21 12:51:19
6Using PDFs to Exchange Signed, Encrypted Data Ron DiNapoli Cornell University, CIT/ATA 5th Annual PKI R&D Workshop

Using PDFs to Exchange Signed, Encrypted Data Ron DiNapoli Cornell University, CIT/ATA 5th Annual PKI R&D Workshop

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2006-04-05 03:09:24
7J-PAKE: Authenticated Key Exchange without PKI Feng Hao1 and Peter Ryan2 1  2

J-PAKE: Authenticated Key Exchange without PKI Feng Hao1 and Peter Ryan2 1 2

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2010-12-17 06:46:52
8Password Authenticated Key Exchange by Juggling - A key exchange protocol without PKI

Password Authenticated Key Exchange by Juggling - A key exchange protocol without PKI

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2008-04-16 17:16:56
9Password Authenticated Key Exchange by Juggling  Feng Hao⋆1 and Peter Ryan2 1 2

Password Authenticated Key Exchange by Juggling Feng Hao⋆1 and Peter Ryan2 1 2

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2008-04-30 07:42:46
10On Small Subgroup Non-confinement Attack Feng Hao Thales E-Security, Cambridge, UK [removed]  Abstract—The small subgroup confinement attack works by

On Small Subgroup Non-confinement Attack Feng Hao Thales E-Security, Cambridge, UK [removed] Abstract—The small subgroup confinement attack works by

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2010-04-26 16:33:56