Sciweavers

403 search results - page 3 / 81
» Secure Protocols with Asymmetric Trust
Sort
View
IMA
1997
Springer
211views Cryptology» more  IMA 1997»
13 years 10 months ago
Key Agreement Protocols and Their Security Analysis
This paper proposes new protocols for two goals: authenticated key agreement and authenticated key agreement with key con rmation in the asymmetric public-key setting. A formalm...
Simon Blake-Wilson, Don Johnson, Alfred Menezes
SPW
1999
Springer
13 years 10 months ago
Trust Management and Network Layer Security Protocols
Matt Blaze, John Ioannidis, Angelos D. Keromytis
COCOON
2010
Springer
13 years 10 months ago
Identity-Based Authenticated Asymmetric Group Key Agreement Protocol
In identity-based public-key cryptography, an entity’s public key can be easily derived from its identity. The direct derivation of public keys in identity-based public-key crypt...
Lei Zhang, Qianhong Wu, Bo Qin, Josep Domingo-Ferr...
WISTP
2007
Springer
13 years 12 months ago
Securing the Distribution and Storage of Secrets with Trusted Platform Modules
Abstract. We present a protocol that allows servers to securely distribute secrets to trusted platforms. The protocol maintains the confidentiality of secrets in the face of eaves...
Paul E. Sevinç, Mario Strasser, David A. Ba...
PET
2010
Springer
13 years 9 months ago
Anonymous Webs of Trust
Abstract. Webs of trust constitute a decentralized infrastructure for establishing the authenticity of the binding between public keys and users and, more generally, trust relation...
Michael Backes, Stefan Lorenz, Matteo Maffei, Kim ...