Sciweavers

308 search results - page 36 / 62
» A New Model for Public-Key Authentication
Sort
View
ISW
2004
Springer
15 years 5 months ago
Practical Authenticated Key Agreement Using Passwords
Due to the low entropy of human-memorable passwords, it is not easy to conduct password authenticated key agreement in a secure manner. Though there are many protocols achieving th...
Taekyoung Kwon
PDCAT
2005
Springer
15 years 5 months ago
Authentication with controlled anonymity in P2P systems
This paper describes a new protocol for authentication in Peer-to-Peer systems. The protocol has been designed to meet specialized requirements of P2P systems, such as lack of dir...
Adam Wierzbicki, Aneta Zwierko, Zbigniew Kotulski
DAM
2006
121views more  DAM 2006»
14 years 12 months ago
Fine-grained forward-secure signature schemes without random oracles
We propose the concept of fine-grained forward-secure signature schemes. Such signature schemes not only provide non-repudiation w.r.t. past time periods the way ordinary forward-...
Jan Camenisch, Maciej Koprowski
ATAL
2005
Springer
15 years 5 months ago
Access control with safe role assignment for mobile agents
Mobile agent systems provide new perspectives for distributed e-commerce applications. Sea-of-Data (SoD) applications are those that need to process huge quantities of distributed...
Guillermo Navarro, Joan Borrell, Jose A. Ortega-Ru...
ACISP
2010
Springer
15 years 1 months ago
Attribute-Based Authenticated Key Exchange
We introduce the concept of attribute-based authenticated key exchange (AB-AKE) within the framework of ciphertext policy attribute-based systems. A notion of AKE-security for AB-A...
M. Choudary Gorantla, Colin Boyd, Juan Manuel Gonz...