Sciweavers

6 search results - page 1 / 2
» ike 2008
Sort
View
COMCOM
2000
143views more  COMCOM 2000»
13 years 4 months ago
Further analysis of the Internet key exchange protocol
Secure communication over the Internet becomes an essential requirement for any value-added Internet application. The use of cryptography for secure communication brings out the r...
Jianying Zhou
IKE
2008
13 years 6 months ago
Text-independent Speaker Identification Based on MAP Channel Compensation and Pitch-dependent Features
One major source of performance decline in speaker recognition system is channel mismatch between training and testing. This paper focuses on improving channel robustness of speake...
JiQing Han, RongChun Gao
IJNSEC
2008
146views more  IJNSEC 2008»
13 years 4 months ago
Formal Protocol Design of ESIKE Based on Authentication Tests
In this paper, we first present a concrete formal protocol design approach, which is based on authentication tests, to create an Efficient and Secure Internet Key Exchange (ESIKE)...
Rui Jiang, Aiqun Hu, Jianhua Li