Back to Results
First PageMeta Content
Security / Password-authenticated key agreement / Key-agreement protocol / Public-key cryptography / Transport Layer Security / Perfect forward secrecy / Authentication protocol / Authentication / Kerberos / Cryptographic protocols / Cryptography / Data


Designs, Codes and Cryptography manuscript No. (will be inserted by the editor) Anonymity and one-way authentication in key exchange protocols Ian Goldberg · Douglas Stebila ·
Add to Reading List

Document Date: 2012-01-13 10:28:23


Open Document

File Size: 715,90 KB

Share Result on Facebook

City

Waterloo / /

Company

Section 6 / Google / /

Country

Canada / /

/

Event

FDA Phase / /

Facility

University of Waterloo / Sabancı University / Queensland University of Technology / Douglas Stebila Information Security Institute / /

IndustryTerm

online privacy / authentication protocol / Internet caf´es / agreement protocols / Parties implementing protocols / anonymity networks / public key infrastructure / authenticated protocols / important privacy tool / authenticated key exchange protocols / public-key infrastructure / honest server / cryptographic key agreement protocol / advertising space / agreement protocol / Internet surveillance users / reasonable protocol / deniable protocol / search requests / cryptographic protocols / typical protocol / identity-based anonymous authenticated key exchange protocol / et al. protocol / search engines / anonymity network / secure web / authenticated key exchange protocol / Internet service / returned search queries / server management / search engine / /

Organization

Queensland University of Technology / Brisbane / Berkant Ustaoglu Faculty of Engineering and Natural Sciences / University of Waterloo / C. Existing / Sabancı University / Istanbul / 94A60 Cryptography Ian Goldberg Cheriton School of Computer Science / Douglas Stebila Information Security Institute / AKE / /

Person

Douglas Stebila / Ian Goldberg / Morrissey / /

Position

editor / /

Product

CCA2 / KAS1 / Øverlier / /

ProvinceOrState

Ontario / /

PublishedMedium

The Canetti-Krawczyk post / /

Technology

cryptographic key agreement protocol / alternative protocols / identity-based anonymous authenticated key exchange protocol / public key infrastructure / existing AKE protocols / key exchange protocol / PKI / Key agreement using public-key encryption / key exchange protocols / key agreement protocol / AKE protocols / so-called fourth 6 Ian Goldberg et al. protocol / private key / search engine / secret key / key agreement protocols / deniable protocol / One-flow AKE protocols / public-key infrastructure / Public key encryption / encryption / authenticated key exchange protocol / Cryptography / one-flow AKE protocol / previous protocol / enabling technology / Tor authentication protocol / analyzing key agreement protocols / TLS protocol / public key / public-key encryption / typical protocol / ISP / HTTP / mutually authenticated key exchange protocol / few protocols / 9 4.3 Public-key encryption / Parties implementing protocols / fourth protocol / simulation / KAS1 protocol / reasonable protocol / authenticated key exchange protocols / AKE protocol / /

SocialTag