Password-authenticated key agreement

Results: 56



#Item
21Diffie–Hellman key exchange / Secure Remote Password protocol / Encrypted key exchange / Public-key cryptography / Internet Key Exchange / Salt / SPEKE / Password-authenticated key agreement / Cryptographic protocols / Cryptography / Password

The Second International Conference on Sensor Technologies and Applications Simultaneous Authentication of Equals: A Secure, Password-Based Key Exchange for Mesh Networks Dan Harkins Aruba Networks

Add to Reading List

Source URL: www.q.hscott.net

Language: English - Date: 2014-01-21 12:51:19
22Password / Cryptographic protocols / One-time password / Authentication / Cryptographic software / Challenge-response authentication / Password-authenticated key agreement / Security / Cryptography / Computer security

Secure (One-Time-) Password Authentication for the Globus Toolkit Olivier Chevassut (Lawrence Berkeley National Laboratory) Frank Siebenlist

Add to Reading List

Source URL: toolkit.globus.org

Language: English - Date: 2006-04-13 14:21:19
23Random oracle / Authenticated encryption / Communications protocol / Key-agreement protocol / Cryptography / Cryptographic protocols / Password-authenticated key agreement

Conditions of Use 1) Disclaimer, Attribution and Copyright acknowledgement a) Any publication of Bureau tide predictions must acknowledge copyright in the Material in the Commonwealth of Australia represented by the Bure

Add to Reading List

Source URL: www.bom.gov.au

Language: English - Date: 2014-12-03 18:01:45
24Random oracle / Authenticated encryption / Communications protocol / Key-agreement protocol / Cryptography / Cryptographic protocols / Password-authenticated key agreement

Key Establishment: Proofs and Refutations Kim-Kwang Raymond CHOO Bachelor of Science in Mathematics - Dec 2000 Bachelor of Applied Science (Hons) Industrial and Applied Maths - May 2002 Master of Information Technology -

Add to Reading List

Source URL: eprints.qut.edu.au

Language: English - Date: 2010-06-09 09:11:18
25Password / Key management / Challenge-response authentication / Needham–Schroeder protocol / Known-plaintext attack / Kerberos / Key / RSA / Password-authenticated key agreement / Cryptography / Cryptographic protocols / Public-key cryptography

© IEEE[removed]Protecting Poorly Chosen Secrets from Guessing Attacks Li Gong, T. Mark A. Lomas, Roger M. Needham, and Jerome H. Saltzer June 8, 1993

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2011-05-18 00:11:55
26Computing / Key-agreement protocol / Authentication protocol / Authenticator / Secure channel / IEEE 802.1X / Password-authenticated key agreement / Cryptographic protocols / Data / Information

Secure Key Establishment for Mobile Networks by Yiu Shing Terry Tin Bachelor of Information Technology

Add to Reading List

Source URL: eprints.qut.edu.au

Language: English - Date: 2010-06-09 09:10:13
27Password-authenticated key agreement / Transmission Control Protocol / Data / Applied mathematics / Information / Cryptographic protocols / XTR / NP

CS355: Topics in cryptography Fall 2007 Assignment #2 Due: Wednesday, Dec. 5, 2007.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2007-12-25 03:13:40
28Password / Challenge-response authentication / Rainbow table / Secure Shell / Salt / Cryptographic software / Computer network security / Password-authenticated key agreement / Security / Computer security / Cryptography

Authentication “ Wha twa sy ourus

Add to Reading List

Source URL: www.cypherpunks.to

Language: English - Date: 2006-03-20 04:01:25
29Public-key cryptography / Key / Alice and Bob / Password-authenticated key agreement / SPEKE / Cryptography / Cryptographic protocols / Key-agreement protocol

Microsoft PowerPoint - nm-extractors

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2013-12-19 22:46:32
30Internet protocols / Internet / Internet standards / Secure communication / Password-authenticated key agreement / Password / Challenge-response authentication / Secure Shell / Transport Layer Security / Cryptographic protocols / Computing / Data

Leakage-Resilient Authenticated Key Establishment Protocols SeongHan Shin, Kazukuni Kobara, and Hideki Imai Institute of Industrial Science, The University of Tokyo, 4-6-1 Komaba, Meguro-ku, Tokyo[removed], Japan shinsh@

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
UPDATE