Sciweavers

1116 search results - page 12 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
83
Voted
IJNSEC
2006
78views more  IJNSEC 2006»
15 years 13 days ago
Authentication and Key Agreement Protocols Preserving Anonymity
Anonymity is a very important security feature in addition to authentication and key agreement features in communication protocols. In this paper, we propose two authentication an...
Kumar V. Mangipudi, Rajendra S. Katti, Huirong Fu
125
Voted
PKC
2004
Springer
160views Cryptology» more  PKC 2004»
15 years 5 months ago
Constant Round Authenticated Group Key Agreement via Distributed Computation
Abstract. A group key agreement protocol allows a set of users, communicating over a public network, to agree on a private session key. Most of the schemes proposed so far require ...
Emmanuel Bresson, Dario Catalano
110
Voted
PERCOM
2007
ACM
16 years 1 days ago
A three round authenticated group key agreement protocol for ad hoc networks
Group Key Agreement (GKA) protocols enable the participants to derive a key based on each one's contribution over a public network without any central authority. They also pr...
Daniel Augot, Raghav Bhaskar, Valérie Issarny, Da...
CRYPTO
2006
Springer
73views Cryptology» more  CRYPTO 2006»
15 years 4 months ago
Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets
Yevgeniy Dodis, Jonathan Katz, Leonid Reyzin, Adam...
89
Voted
COMCOM
2004
83views more  COMCOM 2004»
15 years 8 days ago
Mutual authentication and group key agreement for low-power mobile devices
Emmanuel Bresson, Olivier Chevassut, Abdelilah Ess...