Key-agreement protocol

Results: 124



#Item
41Cryptographic protocols / Cryptography / Public-key cryptography / Password authentication protocol

Attack on Two ID-based Authenticated Group Key Agreement Schemes Fangguo Zhang1 and Xiaofeng Chen2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-12-19 03:05:28
42Random oracle / Password / ID-based encryption / Key-agreement protocol / Advantage / Public-key cryptography / Semantic security / Password Authenticated Key Exchange by Juggling / Cryptography / Cryptographic protocols / Password-authenticated key agreement

ID-Based Group Password-Authenticated Key Exchange Xun Yi1 , Raylin Tso2 , and Eiji Okamoto2 1 School of Engineering and Science

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-04 01:09:45
43Transmission Control Protocol / Public-key cryptography / Cryptography / Cryptographic protocols / Diffie–Hellman key exchange

On the security of a group key agreement protocol Qiang Tang ´ D´epartement d’Informatique, Ecole Normale Sup´erieure 45 Rue d’Ulm, 75230 Paris Cedex 05, France

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-12 15:34:38
44Dolev-Yao model / Public-key cryptography / Protocol composition logic / XTR / Cryptographic primitive / Semantic security / Secure channel / Key-agreement protocol / Commitment scheme / Cryptography / Cryptographic protocols / Ciphertext indistinguishability

Computationally sound compositional logic for key exchange protocols ∗ Anupam Datta, Ante Derek, John C. Mitchell Dept. Computer Science, Stanford University {danupam, aderek, mitchell}@cs.stanford.edu Abstract

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2007-12-18 00:37:13
45Public key certificate / Revocation list / Certificate authority / Online Certificate Status Protocol / Root certificate / Public key infrastructure / Base / Digital signature / KPN / Cryptography / Public-key cryptography / Key management

Relying Party Agreement - versionThe Relying Party Agreement (RPA) below applies to certificates issued by KPN. However, the certificate that referred you to this page may have been issued by an organization with

Add to Reading List

Source URL: certificaat.kpn.com

Language: English - Date: 2014-04-28 08:01:51
46Cryptographic protocols / Digital signature / RSA / Diffie–Hellman key exchange / Key-agreement protocol / Cypherpunk / Perfect forward secrecy / Key / Public key infrastructure / Cryptography / Key management / Public-key cryptography

Two Remarks on Public Key Cryptology Ross Anderson University of Cambridge Computer Laboratory, New Museums Site, Pembroke Street, Cambridge CB2 3QG, UK

Add to Reading List

Source URL: cypherspace.org

Language: English - Date: 2003-11-23 22:40:31
47Computer security / Computer network security / Security service / Non-repudiation / Public key infrastructure / Deniable authentication / Plausible deniability / Key-agreement protocol / Information security / Cryptography / Public-key cryptography / Cryptographic protocols

Cryptography and Evidence Michael Roe Clare College A dissertation submitted for the degree of Doctor of Philosophy in the University of Cambridge

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 1999-08-17 09:51:55
48Diffie–Hellman key exchange / Secure Remote Password protocol / Encrypted key exchange / Public-key cryptography / Internet Key Exchange / Salt / SPEKE / Password-authenticated key agreement / Cryptographic protocols / Cryptography / Password

The Second International Conference on Sensor Technologies and Applications Simultaneous Authentication of Equals: A Secure, Password-Based Key Exchange for Mesh Networks Dan Harkins Aruba Networks

Add to Reading List

Source URL: www.q.hscott.net

Language: English - Date: 2014-01-21 12:51:19
49Carbon finance / Climatology / United Nations Framework Convention on Climate Change / Environmental economics / Carbon dioxide / Climate change mitigation / Emissions trading / Kyoto Protocol / Garnaut Climate Change Review / Climate change policy / Environment / Climate change

Towards global agreement 9 Key points

Add to Reading List

Source URL: www.rossgarnaut.com.au

Language: English - Date: 2013-09-05 01:53:03
50Cryptographic protocols / Internet protocols / Internet standards / Online Certificate Status Protocol / OCSP stapling / Public key certificate / Revocation list / Certificate policy / Cryptography / Public-key cryptography / Key management

Terms of Use Agreement 1. Accuracy of Information: An obligation and warranty to provide accurate and complete information at all times to WoSign, both in the certificate request and as otherwise requested by WoSign in c

Add to Reading List

Source URL: www.wosign.com

Language: English - Date: 2015-03-06 06:12:48
UPDATE