Sciweavers

691 search results - page 23 / 139
» A New Security Model for Authenticated Key Agreement
Sort
View
CRYPTO
2010
Springer
171views Cryptology» more  CRYPTO 2010»
15 years 2 months ago
Credential Authenticated Identification and Key Exchange
Secure two-party authentication and key exchange are fundamental problems. Traditionally, the parties authenticate each other by means of their identities, using a public-key infr...
Jan Camenisch, Nathalie Casati, Thomas Groß,...
TCC
2005
Springer
139views Cryptology» more  TCC 2005»
15 years 7 months ago
The Relationship Between Password-Authenticated Key Exchange and Other Cryptographic Primitives
Abstract. We consider the problem of password-authenticated key exchange (PAK) also known as session-key generation using passwords: constructing session-key generation protocols t...
Minh-Huyen Nguyen
JCP
2007
122views more  JCP 2007»
15 years 1 months ago
Converting Group Key Agreement Protocol into Password-Based Setting - Case Study
Abstract— Converting a secure group key agreement protocol into password-based setting is not a trivial task. The security of a password-based scheme hinges on preventing diction...
Ratna Dutta
FC
2007
Springer
141views Cryptology» more  FC 2007»
15 years 7 months ago
WSKE: Web Server Key Enabled Cookies
In this paper, we present the design and prototype of a new approach to cookie management: if a server deposits a cookie only after authenticating itself via the SSL handshake, the...
Chris Masone, Kwang-Hyun Baek, Sean W. Smith
KIVS
2007
Springer
15 years 7 months ago
A New Model for Public-Key Authentication
Reto Kohlas, Jacek Jonczy, Rolf Haenni