Sciweavers

4 search results - page 1 / 1
» On the Key-Compromise Impersonation Vulnerability of One-Pas...
Sort
View
SECRYPT
2007
92views Business» more  SECRYPT 2007»
13 years 6 months ago
On the Key-Compromise Impersonation Vulnerability of One-Pass Key Establishment Protocols
Konstantinos Chalkias, F. Mpaldimtsi, Dimitris Hri...
EUROPKI
2006
Springer
13 years 9 months ago
On the Resilience of Key Agreement Protocols to Key Compromise Impersonation
Abstract. Key agreement protocols are a fundamental building block for ensuring authenticated and private communications between two parties over an insecure network. This paper fo...
Maurizio Adriano Strangio
ICCSA
2007
Springer
13 years 11 months ago
An Enhanced ID-Based Deniable Authentication Protocol on Pairings
Deniability is defined as a privacy property which enables protocol principals to deny their involvement after they had taken part in a particular protocol run. Lately, Chou et al....
Meng-Hui Lim, Sanggon Lee, Youngho Park, Hoonjae L...
CSFW
2003
IEEE
13 years 10 months ago
Identity Based Authenticated Key Agreement Protocols from Pairings
We investigate a number of issues related to identity based authenticated key agreement protocols using the Weil or Tate pairings. These issues include how to make protocols effici...
Liqun Chen, Caroline Kudla