Sciweavers

135 search results - page 5 / 27
» Authentication and Key Agreement Protocols Preserving Anonym...
Sort
View
CCS
2007
ACM
14 years 1 months ago
Universally composable and forward-secure RFID authentication and authenticated key exchange
Recently, a universally composable framework for RFID authentication protocols providing availability, anonymity, and authenticity was proposed. In this paper we extend that frame...
Tri Van Le, Mike Burmester, Breno de Medeiros
ICICS
2005
Springer
14 years 1 months ago
Security Properties of Two Authenticated Conference Key Agreement Protocols
In this paper we analyse the security of two authenticated group key agreement schemes based on the group key agreement protocol of Burmester and Desmedt. One scheme was proposed ...
Qiang Tang, Chris J. Mitchell
DCC
2003
IEEE
14 years 7 months ago
An Efficient Protocol for Authenticated Key Agreement
Laurie Law, Alfred Menezes, Minghua Qu, Jerome A. ...
CISC
2005
Springer
169views Cryptology» more  CISC 2005»
14 years 1 months ago
On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography
Abstract. Despite many good (secure) key agreement protocols based on publickey cryptography exist, secure associations between two wireless devices are often established using sym...
Serge Vaudenay
ACSAC
2001
IEEE
13 years 11 months ago
Secure Anonymous Group Infrastructure for Common and Future Internet Applications
Secure group communication protocols, in particular multi-party key agreement and update algorithms, help promote traditional and new Internet multi-party applications such as vid...
Nathalie Weiler