Sciweavers

252 search results - page 3 / 51
» On Robust Key Agreement Based on Public Key Authentication
Sort
View
QUANTUMCOMM
2009
Springer
14 years 18 days ago
The Case for Quantum Key Distribution
Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructur...
Douglas Stebila, Michele Mosca, Norbert Lütke...
CRYPTO
2006
Springer
73views Cryptology» more  CRYPTO 2006»
13 years 9 months ago
Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets
Yevgeniy Dodis, Jonathan Katz, Leonid Reyzin, Adam...
IJNSEC
2008
145views more  IJNSEC 2008»
13 years 6 months ago
Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing
Most of the current security architectures for grid systems use conventional public key infrastructure (PKI) to authenticate grid members and to secure resource allocation to thes...
Shengbao Wang, Zhenfu Cao, Haiyong Bao
EUC
2008
Springer
13 years 7 months ago
An Improved Password-Based Authenticated Key Agreement Scheme for Pervasive Applications
Password authentication is a popular approach used for user authentication in pervasive computing environments due to its simplicity and convenience. To secure the transmission be...
Maw-Jinn Tsaur, Wei-Chi Ku, Hao-Rung Chung
EUROPKI
2006
Springer
13 years 9 months ago
On the Resilience of Key Agreement Protocols to Key Compromise Impersonation
Abstract. Key agreement protocols are a fundamental building block for ensuring authenticated and private communications between two parties over an insecure network. This paper fo...
Maurizio Adriano Strangio