Sciweavers

322 search results - page 2 / 65
» Entity Authentication and Key Distribution
Sort
View
WECWIS
1999
IEEE
116views ECommerce» more  WECWIS 1999»
13 years 10 months ago
Towards a Scalable PKI for Electronic Commerce Systems
In an e-commerce system, security, in particular authentication, is of paramount importance. Public-key Infrastructure is often used to enforce authentication and the property of ...
Chenxi Wang, William A. Wulf
UC
2007
Springer
14 years 3 days ago
Quantum Authenticated Key Distribution
Quantum key distributionalgorithmsuse a quantum communicationchannel with quantum information and a classical communication channel for binary information. The classical channel, ...
Naya Nagy, Selim G. Akl
CMS
2003
108views Communications» more  CMS 2003»
13 years 7 months ago
Towards an IPv6-Based Security Framework for Distributed Storage Resources
Abstract. Some security problems can be often solved through authorization rather than authentication. Furthermore, certificate-based authorization approach can alleviate usual dr...
Alessandro Bassi, Julien Laganier
QUANTUMCOMM
2009
Springer
14 years 16 days ago
The Case for Quantum Key Distribution
Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructur...
Douglas Stebila, Michele Mosca, Norbert Lütke...
JUCS
2008
166views more  JUCS 2008»
13 years 6 months ago
Bilateral Unknown Key-Share Attacks in Key Agreement Protocols
Unknown Key-Share (UKS) resilience is a basic security attribute in authenticated key agreement protocols, whereby two entities A and B should not be able to be coerced into shari...
Liqun Chen, Qiang Tang