Password-authenticated key agreement

Results: 56



#Item
21The Second International Conference on Sensor Technologies and Applications  Simultaneous Authentication of Equals: A Secure, Password-Based Key Exchange for Mesh Networks Dan Harkins Aruba Networks

The Second International Conference on Sensor Technologies and Applications Simultaneous Authentication of Equals: A Secure, Password-Based Key Exchange for Mesh Networks Dan Harkins Aruba Networks

Add to Reading List

Source URL: www.q.hscott.net

Language: English - Date: 2014-01-21 12:51:19
22Secure (One-Time-) Password Authentication for the Globus Toolkit Olivier Chevassut (Lawrence Berkeley National Laboratory)  Frank Siebenlist

Secure (One-Time-) Password Authentication for the Globus Toolkit Olivier Chevassut (Lawrence Berkeley National Laboratory) Frank Siebenlist

Add to Reading List

Source URL: toolkit.globus.org

Language: English - Date: 2006-04-13 14:21:19
23Conditions of Use 1) Disclaimer, Attribution and Copyright acknowledgement a) Any publication of Bureau tide predictions must acknowledge copyright in the Material in the Commonwealth of Australia represented by the Bure

Conditions of Use 1) Disclaimer, Attribution and Copyright acknowledgement a) Any publication of Bureau tide predictions must acknowledge copyright in the Material in the Commonwealth of Australia represented by the Bure

Add to Reading List

Source URL: www.bom.gov.au

Language: English - Date: 2014-12-03 18:01:45
24Key Establishment: Proofs and Refutations Kim-Kwang Raymond CHOO Bachelor of Science in Mathematics - Dec 2000 Bachelor of Applied Science (Hons) Industrial and Applied Maths - May 2002 Master of Information Technology -

Key Establishment: Proofs and Refutations Kim-Kwang Raymond CHOO Bachelor of Science in Mathematics - Dec 2000 Bachelor of Applied Science (Hons) Industrial and Applied Maths - May 2002 Master of Information Technology -

Add to Reading List

Source URL: eprints.qut.edu.au

Language: English - Date: 2010-06-09 09:11:18
25© IEEE[removed]Protecting Poorly Chosen Secrets from Guessing Attacks Li Gong, T. Mark A. Lomas, Roger M. Needham, and Jerome H. Saltzer June 8, 1993

© IEEE[removed]Protecting Poorly Chosen Secrets from Guessing Attacks Li Gong, T. Mark A. Lomas, Roger M. Needham, and Jerome H. Saltzer June 8, 1993

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2011-05-18 00:11:55
26Secure Key Establishment for Mobile Networks by Yiu Shing Terry Tin Bachelor of Information Technology

Secure Key Establishment for Mobile Networks by Yiu Shing Terry Tin Bachelor of Information Technology

Add to Reading List

Source URL: eprints.qut.edu.au

Language: English - Date: 2010-06-09 09:10:13
27CS355: Topics in cryptography  Fall 2007 Assignment #2 Due: Wednesday, Dec. 5, 2007.

CS355: Topics in cryptography Fall 2007 Assignment #2 Due: Wednesday, Dec. 5, 2007.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2007-12-25 03:13:40
28Authentication “ Wha twa sy ourus

Authentication “ Wha twa sy ourus

Add to Reading List

Source URL: www.cypherpunks.to

Language: English - Date: 2006-03-20 04:01:25
29Microsoft PowerPoint - nm-extractors

Microsoft PowerPoint - nm-extractors

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2013-12-19 22:46:32
30Leakage-Resilient Authenticated Key Establishment Protocols SeongHan Shin, Kazukuni Kobara, and Hideki Imai Institute of Industrial Science, The University of Tokyo, 4-6-1 Komaba, Meguro-ku, Tokyo[removed], Japan shinsh@

Leakage-Resilient Authenticated Key Establishment Protocols SeongHan Shin, Kazukuni Kobara, and Hideki Imai Institute of Industrial Science, The University of Tokyo, 4-6-1 Komaba, Meguro-ku, Tokyo[removed], Japan shinsh@

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54