Sciweavers

90 search results - page 9 / 18
» Asymmetric Group Key Agreement
Sort
View
COMCOM
2004
83views more  COMCOM 2004»
13 years 8 months ago
Mutual authentication and group key agreement for low-power mobile devices
Emmanuel Bresson, Olivier Chevassut, Abdelilah Ess...
ACNS
2004
Springer
104views Cryptology» more  ACNS 2004»
14 years 2 months ago
Key Agreement Using Statically Keyed Authenticators
A family of authenticators based on static shared keys is identified and proven secure. The authenticators can be used in a variety of settings, including identity-based ones. App...
Colin Boyd, Wenbo Mao, Kenneth G. Paterson
MDAI
2005
Springer
14 years 2 months ago
One-Way and Two-Party Authenticated ID-Based Key Agreement Protocols Using Pairing
Cryptography is the ancient science of encrypting messages so that only the sender and receiver can recover them. To achieve this goal, an agreed key between the sender and receive...
Takeshi Okamoto, Raylin Tso, Eiji Okamoto