Sciweavers

4 search results - page 1 / 1
» A Simulation-Based Treatment of Authenticated Message Exchan...
Sort
View
ASIAN
2009
Springer
284views Algorithms» more  ASIAN 2009»
13 years 5 months ago
A Simulation-Based Treatment of Authenticated Message Exchange
Klaas Ole Kürtz, Henning Schnoor, Thomas Wilk...
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
12 years 7 months ago
Ideal Key Derivation and Encryption in Simulation-Based Security
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Ralf Küsters, Max Tuengerthal
JUCS
2008
149views more  JUCS 2008»
13 years 4 months ago
Formal Security Definition and Efficient Construction for Roaming with a Privacy-Preserving Extension
: In a secure roaming scenario, a user U travels to a foreign network and communicates with a foreign server V securely so that no one other than U and V can obtain the messages ex...
Guomin Yang, Duncan S. Wong, Xiaotie Deng

Lecture Notes
404views
15 years 2 months ago
Network Security
A comprehensive treatment of network security. Topics include remote access security, DMZ, firewalls, VPNs, PKI architecture, X.509 Public key infrastructure, web security, S-HTTP,...
Raj Jain