Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
1150
search results - page 49 / 230
»
Beacon Based Authentication
Sort
relevance
views
votes
recent
update
View
thumb
title
117
Voted
CRYPTO
2004
Springer
127
views
Cryptology
»
more
CRYPTO 2004
»
IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange
15 years 7 months ago
Download
www.bolet.org
Abstract. In this paper we revisit one of the most popular passwordbased key exchange protocols, namely the OKE (for Open Key Exchange) scheme, proposed by Luck in 1997. Our result...
Dario Catalano, David Pointcheval, Thomas Pornin
claim paper
Read More »
107
click to vote
ICCSA
2004
Springer
112
views
Applied Computing
»
more
ICCSA 2004
»
A Security Proxy Based Protocol for Authenticating the Mobile IPv6 Binding Updates
15 years 7 months ago
Download
isyou.hosting.paran.com
Il-Sun You, Kyungsan Cho
claim paper
Read More »
70
Voted
SAC
2003
ACM
99
views
Applied Computing
»
more
SAC 2003
»
Delay-Based Circuit Authentication and Applications
15 years 7 months ago
Download
gassend.net
Blaise Gassend, Dwaine E. Clarke, Marten van Dijk,...
claim paper
Read More »
144
click to vote
KES
1999
Springer
109
views
Information Technology
»
more
KES 1999
»
An elliptic curve authenticated key exchange based approach to key infrastructure
15 years 6 months ago
Download
eref.uqu.edu.sa
P. Koduri, A. Mahajan, P. Montague, P. Moseley
claim paper
Read More »
118
click to vote
ESORICS
2007
Springer
141
views
Security Privacy
»
more
ESORICS 2007
»
Efficient Password-Based Authenticated Key Exchange Without Public Information
15 years 6 months ago
Download
eprint.iacr.org
Jun Shao, Zhenfu Cao, Licheng Wang, Rongxing Lu
claim paper
Read More »
« Prev
« First
page 49 / 230
Last »
Next »