Key-agreement protocol

Results: 124



#Item
21VME Cell  TM VME Cell combines three layers of security in order to provide a completely secured Connection:

VME Cell TM VME Cell combines three layers of security in order to provide a completely secured Connection:

Add to Reading List

Source URL: www.meganet.com

Language: English - Date: 2014-10-24 18:00:43
22Exploring Robustness in Group Key Agreement Yair Amir   Yongdae Kim

Exploring Robustness in Group Key Agreement Yair Amir  Yongdae Kim

Add to Reading List

Source URL: www.cnds.jhu.edu

Language: English - Date: 2013-09-18 16:37:35
23VME Cell  TM VME Cell combines three layers of security in order to provide a completely secured Connection:

VME Cell TM VME Cell combines three layers of security in order to provide a completely secured Connection:

Add to Reading List

Source URL: www.meganet.com

Language: English - Date: 2014-10-24 18:00:57
24Authentication and Key Agreement via Memorable Password Taekyoung Kwon  Abstract  them, the knowledge-based scheme is aimed for

Authentication and Key Agreement via Memorable Password Taekyoung Kwon Abstract them, the knowledge-based scheme is aimed for

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2001-07-20 00:20:35
25Exploring Robustness in Group Key Agreement Yair Amir   Yongdae Kim

Exploring Robustness in Group Key Agreement Yair Amir  Yongdae Kim

Add to Reading List

Source URL: www.cnds.jhu.edu

Language: English - Date: 2013-09-18 16:37:34
26

PDF Document

Add to Reading List

Source URL: grouper.ieee.org

Language: English - Date: 2008-04-27 09:53:57
27Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement Dario Fiore1? , Rosario Gennaro2 , and Nigel P. Smart3 ´ Ecole Normale Sup´erieure,

Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement Dario Fiore1? , Rosario Gennaro2 , and Nigel P. Smart3 ´ Ecole Normale Sup´erieure,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-08-30 11:15:58
28Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols Jue-Sam Chou1 , Yalin Chen 2 , Ming-De Yang 3 1  Department of Information Management, Nanhua University Chiayi 622 Taiwan, R.O.C

Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols Jue-Sam Chou1 , Yalin Chen 2 , Ming-De Yang 3 1 Department of Information Management, Nanhua University Chiayi 622 Taiwan, R.O.C

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-09 06:49:50
29ID-based Authenticated Two Round Multi-Party Key Agreement

ID-based Authenticated Two Round Multi-Party Key Agreement

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-12-20 20:23:11
30SECOQC White Paper on Quantum Key Distribution and Cryptography Reference: Secoqc-WP-v5 Document type: White Paper Document Date: January

SECOQC White Paper on Quantum Key Distribution and Cryptography Reference: Secoqc-WP-v5 Document type: White Paper Document Date: January

Add to Reading List

Source URL: www.idquantique.com

Language: English - Date: 2015-03-23 10:17:13