Sciweavers

1116 search results - page 20 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
98
Voted
AMC
2005
138views more  AMC 2005»
15 years 11 days ago
Practical convertible authenticated encryption schemes using self-certified public keys
A convertible authenticated encryption scheme allows a designated receiver to recover and verify a message simultaneously, during which the recipient can prove the dishonesty of t...
Jiqiang Lv, Xinmei Wang, Kwangjo Kim
INFORMATICALT
2006
177views more  INFORMATICALT 2006»
15 years 13 days ago
Cryptanalysis and Improvement of Practical Convertible Authenticated Encryption Schemes Using Self-Certified Public Keys
A convertible authenticated encryption scheme allows a specified recipient to recover and verify a message simultaneously. Moreover the recipient can prove the dishonesty of the se...
Zuhua Shao
AINA
2009
IEEE
15 years 5 months ago
Identity-Based Cryptography for Securing Mobile Phone Calls
In this paper, an identity-based key agreement system for mobile telephony in GSM and UMTS networks is presented. The use of telephone numbers as public keys allows the system to ...
Matthew Smith, Christian Schridde, Björn Agel...
112
Voted
CCR
1999
92views more  CCR 1999»
15 years 4 days ago
A fair certification protocol
In this paper a `fair' key generation and certification protocol for Diffie-Hellman keys is proposed, which is intended for use in cases where neither User nor CA are trusted...
Chris J. Mitchell, Konstantinos Rantos
117
Voted
CEAS
2008
Springer
15 years 2 months ago
Improving Email Trustworthiness through Social-Group Key Authentication
The increasing use of email for phishing and unsolicited marketing has reduced the trustworthiness of email as a communication medium. Sender authentication is a known defense aga...
Vivek Pathak, Liviu Iftode, Danfeng Yao