Sciweavers

17 search results - page 4 / 4
» Proofs for Two-Server Password Authentication
Sort
View
IJNSEC
2006
110views more  IJNSEC 2006»
13 years 5 months ago
Password-based Encrypted Group Key Agreement
This paper presents an efficient password-based authenticated encrypted group key agreement protocol immune to dictionary attack under the computation Diffie-Hellman (CDH) assumpt...
Ratna Dutta, Rana Barua
SSS
2009
Springer
195views Control Systems» more  SSS 2009»
14 years 4 days ago
Anonymous Transactions in Computer Networks
Abstract. We present schemes for providing anonymous transactions while privacy and anonymity are preserved, providing user anonymous authentication in distributed networks such as...
Shlomi Dolev, Marina Kopeetsky