Back to Results
First PageMeta Content
Diffie–Hellman key exchange / Public-key cryptography / Internet Key Exchange / Shared secret / Public key infrastructure / Elliptic curve Diffie–Hellman / MQV / Cryptography / Cryptographic protocols / Key-agreement protocol


Deniable Authenticated Key Establishment for Internet Protocols Colin Boyd1? and Wenbo Mao2?? and Kenneth G. Paterson3? ? ? 1 Information Security Research Centre, Queensland University of Technology,
Add to Reading List

Document Date: 2004-04-22 14:15:54


Open Document

File Size: 160,48 KB

Share Result on Facebook

City

Bristol / An Underlying Technique Identity / Surrey / /

Company

Australia 2 Hewlett-Packard Laboratories / Dupont / Needham / Hewlett-Packard Laboratories / SIGA Technologies Inc. / /

Country

United Kingdom / /

Event

FDA Phase / /

Facility

Information Security Research Centre / Queensland University of Technology / University of London / /

IndustryTerm

logarithm algorithm / detail specific protocols / probabilistic polynomial time algorithm / sub-protocols / establishment protocol / Internet Protocols / identity-based key establishment protocols / concrete algorithms / Internet Protocols As / secure solutions / inefficient protocol / public-key infrastructure / communications efficiency / subsequent communications session / proposed protocols / agreement protocol / lower layer protocols / Internet Key Exchange The key establishment protocol / cryptographic protocols / resultant secure protocol / non-interactive key agreement protocol / shared-key solution / electronic communications / abstract protocols / establishment protocols / Internet Protocol Security / multi-flow sub-protocol / Internet Protocol / communications partners / positive applications / Internet Key Exchange / Internet communications / process protocols / security solutions / /

Organization

Diffie-Hellman / Queensland University of Technology / Brisbane / Trusted Authority / NUF-NAL / Nuffield Foundation / European Union / Information Security Research Centre / University of London / /

Person

Bob / Alice / Schroeder / /

Position

protocol translator / Private / /

Product

Franklin / AM / IKEv2 / Krawczyk / UM / /

ProgrammingLanguage

K / /

ProvinceOrState

Queensland / California / /

Technology

resultant secure protocol / IKE protocol / IP / PKI / MAC Verify signature Protocol / logarithm algorithm / identity-based encryption / non-interactive key agreement protocol / private key / Basic SIGMA protocol / IKE protocols / public-key infrastructure / public key encryption / encryption / cryptography / Diffie-Hellman key agreement protocol / Public key / Internet Protocol / process protocols / real protocols / 2 Internet Key Exchange The key establishment protocol / key establishment protocols / key establishment protocol / AM SK-secure protocol / abstract protocols / lower layer protocols / identity-based key establishment protocols / digital signature / probabilistic polynomial time algorithm / inefficient protocol / multi-flow sub-protocol / detail specific protocols / SK-secure protocol / AKE protocol / /

SocialTag