Sciweavers

211 search results - page 3 / 43
» Practical Authenticated Key Agreement Using Passwords
Sort
View
JCP
2006
120views more  JCP 2006»
13 years 5 months ago
Password-authenticated Key Exchange using Efficient MACs
Abstract-- This paper is concerned with passwordauthenticated key agreement protocols. Designing such protocols represents an interesting challenge since there is no standard way o...
Maurizio Adriano Strangio
AFRICACRYPT
2009
Springer
14 years 2 days ago
Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness
Michel Abdalla, Dario Catalano, Céline Chev...
ACSAC
2009
IEEE
14 years 2 days ago
A New Approach for Anonymous Password Authentication
—Anonymous password authentication reinforces password authentication with the protection of user privacy. Considering the increasing concern of individual privacy nowadays, anon...
Yanjiang Yang, Jianying Zhou, Jian Weng, Feng Bao
IMA
1997
Springer
211views Cryptology» more  IMA 1997»
13 years 9 months ago
Key Agreement Protocols and Their Security Analysis
This paper proposes new protocols for two goals: authenticated key agreement and authenticated key agreement with key con rmation in the asymmetric public-key setting. A formalm...
Simon Blake-Wilson, Don Johnson, Alfred Menezes
IJNSEC
2008
145views more  IJNSEC 2008»
13 years 5 months ago
Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing
Most of the current security architectures for grid systems use conventional public key infrastructure (PKI) to authenticate grid members and to secure resource allocation to thes...
Shengbao Wang, Zhenfu Cao, Haiyong Bao