نتایج جستجو برای: authenticated

تعداد نتایج: 4119  

Journal: :IEEE Computer 2022

The Internet Engineering Task Force and its Lightweight Authenticated Key Exchange working group have developed a solution that enables public-key-based authenticated key exchange over the most constrained of Things radio communication technologies.

Journal: :Information Technology Journal 2014

Journal: :IEICE Transactions on Information and Systems 2011

Journal: :Designs, Codes and Cryptography 1992

Journal: :Information Technology Journal 2007

2003
Kee-Won Kim Eun-Kyung Ryu Hyung-Mok Lee Kee-Young Yoo

Authenticated key agreement protocols play a significant role in securing communications over public network channels (Internet). This paper proposes a new key agreement protocol based on factorization problem over nonabelian groups. Then it presents two different ways to provide mutual authentication for the proposed protocol; this paper presents a new authenticated key agreement protocol usin...

Journal: :Computer Standards & Interfaces 2007
Rongxing Lu Zhenfu Cao Licheng Wang Congkai Sun

Anonymity and authenticated key exchange should be paid much more attention in secure mobile ad hoc routing protocols, especially in privacy-vital environment. However, as far as we know, few papers on secure routing protocols have addressed both the anonymity and authenticated key exchange. Therefore, in this paper, we present a new secure anonymous routing protocol with authenticated key exch...

2007
Michel Abdalla Jens-Matthias Bohli Maria Isabel Gonzalez Vasco Rainer Steinwandt

A protocol compiler is described, that transforms any provably secure authenticated 2-party key establishment into a provably secure authenticated group key establishment with 2 more rounds of communication. The compiler introduces neither idealizing assumptions nor high-entropy secrets, e. g., for signing. In particular, applying the compiler to a password-authenticated 2-party key establishme...

2007
Giuseppe Di Battista Bernardo Palazzi

We present a general method, based on the usage of typical DBMS primitives, for maintaining authenticated relational tables. The authentication process is managed by an application external to the DBMS, that stores just one hash information of the authentication structure. The method exploits techniques to represent hierarchical data structures into relational tables and queries that allow an e...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید