Sciweavers

62 search results - page 1 / 13
» Efficient, DoS-Resistant, Secure Key Exchange for Internet P...
Sort
View
74
Voted
SPW
2001
Springer
15 years 4 months ago
Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols
William Aiello, Steven M. Bellovin, Matt Blaze, Ra...
COMCOM
2000
143views more  COMCOM 2000»
15 years 5 days ago
Further analysis of the Internet key exchange protocol
Secure communication over the Internet becomes an essential requirement for any value-added Internet application. The use of cryptography for secure communication brings out the r...
Jianying Zhou
95
Voted
CSREASAM
2004
15 years 1 months ago
Experimental Analysis of the Arcanum Key Exchange Protocol
A VPN establishes a secure network using the insecure media of the Internet. However, before a VPN can be established keys must be exchanged between the communicating peers. In th...
Ajmal S. Mian, Raja Iqbal
CCS
2006
ACM
15 years 4 months ago
Deniable authentication and key exchange
We extend the definitional work of Dwork, Naor and Sahai from deniable authentication to deniable key-exchange protocols. We then use these definitions to prove the deniability fe...
Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk
ACISP
2008
Springer
15 years 2 months ago
Efficient One-Round Key Exchange in the Standard Model
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of...
Colin Boyd, Yvonne Cliff, Juan Manuel Gonzá...