Sciweavers

322 search results - page 1 / 65
» Entity Authentication and Key Distribution
Sort
View
CRYPTO
1993
Springer
104views Cryptology» more  CRYPTO 1993»
13 years 9 months ago
Entity Authentication and Key Distribution
Mihir Bellare, Phillip Rogaway
MDAI
2005
Springer
13 years 10 months ago
One-Way and Two-Party Authenticated ID-Based Key Agreement Protocols Using Pairing
Cryptography is the ancient science of encrypting messages so that only the sender and receiver can recover them. To achieve this goal, an agreed key between the sender and receive...
Takeshi Okamoto, Raylin Tso, Eiji Okamoto
ASIACRYPT
2010
Springer
13 years 3 months ago
Generic Compilers for Authenticated Key Exchange
So far, all solutions proposed for authenticated key agreement combine key agreement and authentication into a single cryptographic protocol. However, in many important applicatio...
Tibor Jager, Florian Kohlar, Sven Schäge, J&o...
PERCOM
2006
ACM
14 years 4 months ago
The Master Key: A Private Authentication Approach for Pervasive Computing Environments
We propose a novel entity authentication approach for pervasive computing environments. A person uses a single device, the Master Key, which aggregates all his digital forms of ac...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
AFRICACRYPT
2009
Springer
14 years 2 days ago
Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps
We propose a generic modelling technique that can be used to extend existing frameworks for theoretical security analysis in order to capture the use of timestamps. We apply this t...
Manuel Barbosa, Pooya Farshim