Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Llave cambio")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 243

  • Page / 10
Export

Selection :

  • and

Comments on multiparty key exchange schemeLEE, Narn-Yih; LEE, Ming-Feng.Operating systems review. 2004, Vol 38, Num 4, pp 70-73, issn 0163-5980, 4 p.Article

An improved real-quadratic-field-based key exchange procedureJACOBSON, Michael J; SCHEIDLER, Renate; WILLIAMS, Hugh C et al.Journal of cryptology. 2006, Vol 19, Num 2, pp 211-239, issn 0933-2790, 29 p.Article

Improvement of HWWM-authenticated key agreement protocolLEE, Sung-Woon; KIM, Hyun-Sung; YOO, Kee-Young et al.Applied mathematics and computation. 2005, Vol 162, Num 3, pp 1315-1320, issn 0096-3003, 6 p.Article

Protocole IPsec = IPsec protocolLAURENT-MAKNAVICIUS, Maryline.Techniques de l'ingénieur. Sécurité des systèmes d'information. 2003, Vol SI1, Num TE7545, pp TE7545.1-TE7545.11Article

Tripartite key exchange in the Canetti-Krawczyk proof modelHITCHCOCK, Yvonne; BOYD, Colin; GONZALEZ, Juan Manuel et al.Lecture notes in computer science. 2004, pp 17-32, issn 0302-9743, isbn 3-540-24130-2, 16 p.Conference Paper

Efficient authenticators with application to key exchangeSHAOQUAN JIANG; GUANG GONG.Lecture notes in computer science. 2006, pp 81-91, issn 0302-9743, isbn 3-540-33354-1, 1Vol, 11 p.Conference Paper

A simple group Diffie-Hellman key agreement protocol without member serializationXUKAI ZOU; RAMAMURTHY, Byrav.Lecture notes in computer science. 2004, pp 725-731, issn 0302-9743, isbn 3-540-24127-2, 7 p.Conference Paper

Threshold password-authenticated key exchangeMACKENZIE, Philip; SHRIMPTON, Thomas; JAKOBSSON, Markus et al.Journal of cryptology. 2006, Vol 19, Num 1, pp 27-66, issn 0933-2790, 40 p.Article

Efficient compilers for authenticated group key exchangeQIANG TANG; MITCHELL, Chris J.Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-30818-0, 2Vol, Part 2, 192-197Conference Paper

A MAC-based service bundle authentication mechanism in the OSGi service platformKIM, Young-Gab; MOON, Chang-Joo; PARK, Dae-Ha et al.Lecture notes in computer science. 2004, pp 137-145, issn 0302-9743, isbn 3-540-21047-4, 9 p.Conference Paper

LAKE: A Server-Side Authenticated Key-Establishment with Low Computational WorkloadBICAKCI, Kemal; CRISPO, Bruno; OLIGERI, Gabriele et al.ACM transactions on Internet technology. 2013, Vol 13, Num 2, issn 1533-5399, 5.1-5.27Article

Extension of Diffie-Hellman's Secure Key Distribution Technique to Multipoint BroadcastingABUELYAMAN, Eltayeb; TEBER, Atikan; ALMUSTAFA, Khaled et al.Security & management. International conferenceWorldComp'2010. 2010, pp 714-720, isbn 1-60132-159-7 1-60132-162-7 1-60132-163-5, 7 p.Conference Paper

Quantum cryptography beyond key exchange : Themenheft QuantentechnologieMÜLLER-QUADE, Jörn.Informatik (Berlin, West). 2006, Vol 21, Num 1-2, pp 39-54, issn 0178-3564, 16 p.Article

Provably secure three-party password-based authenticated key exchange protocol using Weil pairingWEN, H.-A; LEE, T.-F; HWANG, T et al.IEE proceedings. Communications. 2005, Vol 152, Num 2, pp 138-143, issn 1350-2425, 6 p.Article

Anonymous password-based authenticated key exchangeDUONG QUANG VIET; YAMAMURA, Akihiro; TANAKA, Hidema et al.Lecture notes in computer science. 2005, pp 244-257, issn 0302-9743, isbn 3-540-30805-9, 1Vol, 14 p.Conference Paper

A secure password-authenticated key exchange between clients with different passwordsYOON, Eun-Jun; YOO, Kee-Young.Lecture notes in computer science. 2006, pp 659-663, issn 0302-9743, isbn 3-540-31158-0, 1Vol, 5 p.Conference Paper

Efficient fair digital-signature exchange based on misbehaviour pénalisationZHANG, N; SHI, Q; NENADIC, A et al.IEE proceedings. Communications. 2005, Vol 152, Num 3, pp 257-261, issn 1350-2425, 5 p.Article

Improvement of Lee and Lee's authenticated key agreement schemeLEE, Sung-Woon; KIM, Hyun-Sung; YOO, Kee-Young et al.Applied mathematics and computation. 2005, Vol 162, Num 3, pp 1049-1053, issn 0096-3003, 5 p.Article

Verifying a MAC-based service bundle authentication mechanism for the OSGI service platformKIM, Young-Gab; JEONG, Dongwon; BAIK, Doo-Kwon et al.Lecture notes in computer science. 2004, pp 684-689, issn 0302-9743, isbn 3-540-22418-1, 6 p.Conference Paper

Key-exchange authentication using shared secretsBADRA, Mohamad; HAJJEH, Ibrahim.Computer (Long Beach, CA). 2006, Vol 39, Num 3, pp 58-66, issn 0018-9162, 9 p.Article

Key exchange using passwords and long keysKOLESNIKOV, Vladimir; RACKOFF, Charles.Lecture notes in computer science. 2006, pp 100-119, issn 0302-9743, isbn 3-540-32731-2, 1Vol, 20 p.Conference Paper

Practical and provably-secure multicasting over high-delay networksNAM, Junghyun; KIM, Hyunjue; KIM, Seungjoo et al.Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-26032-3, 3Vol, part II, 493-501Conference Paper

Constant-round authenticated group key exchange for dynamic groupsKIM, Hyun-Jeong; LEE, Su-Mi; DONG HOON LEE et al.Lecture notes in computer science. 2004, pp 245-259, issn 0302-9743, isbn 3-540-23975-8, 15 p.Conference Paper

Toward a secure Kerberos key exchange with smart cardsMAVROGIANNOPOULOS, Nikos; PASHALIDIS, Andreas; PRENEEL, Bart et al.International journal of information security (Print). 2014, Vol 13, Num 3, pp 217-228, issn 1615-5262, 12 p.Article

Multiparty quantum key agreement with single particlesBIN LIU; FEI GAO; WEI HUANG et al.Quantum information processing (Print). 2013, Vol 12, Num 4, pp 1797-1805, issn 1570-0755, 9 p.Article

  • Page / 10