Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Key exchange")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 237

  • Page / 10
Export

Selection :

  • and

Cryptanalysis of the improved authenticated key agreement protocolCHANG, Ting-Yi; YANG, Chou-Chan; YANG, Ya-Wen et al.Applied mathematics and computation. 2005, Vol 171, Num 2, pp 771-774, issn 0096-3003, 4 p.Article

Threshold password-authenticated key exchangeMACKENZIE, Philip; SHRIMPTON, Thomas; JAKOBSSON, Markus et al.Journal of cryptology. 2006, Vol 19, Num 1, pp 27-66, issn 0933-2790, 40 p.Article

Analysis of key-exchange protocols and their use for building secure channelsCANETTI, Ran; KRAWCZYK, Hugo.Lecture notes in computer science. 2001, pp 453-474, issn 0302-9743, isbn 3-540-42070-3Conference Paper

Scalable protocols for authenticated group key exchangeKATZ, Jonathan; YUNG, Moti.Lecture notes in computer science. 2003, pp 110-125, issn 0302-9743, isbn 3-540-40674-3, 16 p.Conference Paper

Improved authentication key exchange protocol without using one-way hash functionLEE, Narn-Yih; WU, Chien-Nan.Operating systems review. 2004, Vol 38, Num 2, pp 85-92, issn 0163-5980, 8 p.Article

Several practical protocols for authentication and key exchangeCHAE HOON LIM; PIL JOONG LEE.Information processing letters. 1995, Vol 53, Num 2, pp 91-96, issn 0020-0190Article

Comments on multiparty key exchange schemeLEE, Narn-Yih; LEE, Ming-Feng.Operating systems review. 2004, Vol 38, Num 4, pp 70-73, issn 0163-5980, 4 p.Article

An novel three-party authenticated key exchange protocol using one-time keyCHAO LV; MAODE MA; HUI LI et al.Journal of network and computer applications. 2013, Vol 36, Num 1, pp 498-503, issn 1084-8045, 6 p.Article

Cryptanalysis of Lee-Kim-Yoo password-based key agreement schemeJEOUNG OK KWON; JUNG YEON HWANG; KIM, Changwook et al.Applied mathematics and computation. 2005, Vol 168, Num 2, pp 858-865, issn 0096-3003, 8 p.Article

Tripartite key exchange in the Canetti-Krawczyk proof modelHITCHCOCK, Yvonne; BOYD, Colin; GONZALEZ, Juan Manuel et al.Lecture notes in computer science. 2004, pp 17-32, issn 0302-9743, isbn 3-540-24130-2, 16 p.Conference Paper

Initiator-resilient universally composable key exchangeHOFHEINZ, Dennis; MÜLLER-QUADE, Jörn; STEINWANDT, Rainer et al.Lecture notes in computer science. 2003, pp 61-84, issn 0302-9743, isbn 3-540-20300-1, 24 p.Conference Paper

SIGMA: The 'SIGn-and-MAc' approach to authenticated Diffie-Hellman and its use in the IKE protocolsKRAWCZYK, Hugo.Lecture notes in computer science. 2003, pp 400-425, issn 0302-9743, isbn 3-540-40674-3, 26 p.Conference Paper

Cryptanalysis of mutual authentication and key exchange for low power wireless communicationsKYUNGAH SHIM.IEEE communications letters. 2003, Vol 7, Num 5, pp 248-250, issn 1089-7798, 3 p.Article

A framework for password-based authenticated key exchangeGENNARO, Rosario; LINDELL, Yehuda.Lecture notes in computer science. 2003, pp 524-543, issn 0302-9743, isbn 3-540-14039-5, 20 p.Conference Paper

Practical verifiable encryption and decryption of discrete logarithmsCAMENISCH, Jan; SHOUP, Victor.Lecture notes in computer science. 2003, pp 126-144, issn 0302-9743, isbn 3-540-40674-3, 19 p.Conference Paper

Analysis of the SPEKE password-authenticated key exchange protocolMUXIANG ZHANG.IEEE communications letters. 2004, Vol 8, Num 1, pp 63-65, issn 1089-7798, 3 p.Article

Group Diffie-Hellman key exchange secure against dictionary attacksBRESSON, Emmanuel; CHEVASSUT, Olivier; POINTCHEVAL, David et al.Lecture notes in computer science. 2002, pp 497-514, issn 0302-9743, isbn 3-540-00171-9, 18 p.Conference Paper

Efficient password-authenticated key exchange using human-memorable passwordsKATZL, Jonathan; OSTROVSKY, Rafail; YUNG, Moti et al.Lecture notes in computer science. 2001, pp 475-494, issn 0302-9743, isbn 3-540-42070-3Conference Paper

Improvement of HWWM-authenticated key agreement protocolLEE, Sung-Woon; KIM, Hyun-Sung; YOO, Kee-Young et al.Applied mathematics and computation. 2005, Vol 162, Num 3, pp 1315-1320, issn 0096-3003, 6 p.Article

Protocole IPsec = IPsec protocolLAURENT-MAKNAVICIUS, Maryline.Techniques de l'ingénieur. Sécurité des systèmes d'information. 2003, Vol SI1, Num TE7545, pp TE7545.1-TE7545.11Article

Forward secrecy in password-only key exchange protocolsKATZ, Jonathan; OSTROVSKY, Rafail; MOTI YUNG et al.Lecture notes in computer science. 2003, pp 29-44, issn 0302-9743, isbn 3-540-00420-3, 16 p.Conference Paper

Security Analysis of an Unlinkable Secret Handshakes SchemeYOUN, Taek-Young; PARK, Young-Ho.IEEE communications letters. 2010, Vol 14, Num 1, pp 4-5, issn 1089-7798, 2 p.Article

LAKE: A Server-Side Authenticated Key-Establishment with Low Computational WorkloadBICAKCI, Kemal; CRISPO, Bruno; OLIGERI, Gabriele et al.ACM transactions on Internet technology. 2013, Vol 13, Num 2, issn 1533-5399, 5.1-5.27Article

Extension of Diffie-Hellman's Secure Key Distribution Technique to Multipoint BroadcastingABUELYAMAN, Eltayeb; TEBER, Atikan; ALMUSTAFA, Khaled et al.Security & management. International conferenceWorldComp'2010. 2010, pp 714-720, isbn 1-60132-159-7 1-60132-162-7 1-60132-163-5, 7 p.Conference Paper

Scalable protocols for authenticated group key exchangeKATZ, Jonathan; YUNG, Moti.Journal of cryptology. 2007, Vol 20, Num 1, pp 85-113, issn 0933-2790, 29 p.Article

  • Page / 10