Sciweavers

1825 search results - page 42 / 365
» Cryptographic Securities Exchanges
Sort
View
111
Voted
IWSEC
2007
Springer
15 years 8 months ago
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol
At Indocrypt 2005, Viet et al., [22] have proposed an anonymous password-authenticated key exchange (PAKE) protocol and its threshold construction both of which are designed for cl...
SeongHan Shin, Kazukuni Kobara, Hideki Imai
EUROCRYPT
2000
Springer
15 years 6 months ago
Authenticated Key Exchange Secure against Dictionary Attacks
Password-based protocols for authenticated key exchange (AKE) are designed to work despite the use of passwords drawn from a space so small that an adversary might well enumerate, ...
Mihir Bellare, David Pointcheval, Phillip Rogaway
109
Voted
IADIS
2004
15 years 4 months ago
Security Assertion Exchange for the Agent on the Semantic Web
The Semantic Web's success will depend on the implementation and use of Web Service becoming preeminent in Ecommerce, which will likely be agent-based in the future. On the S...
Joo-Young Lee, Ki-Young Moon
115
Voted
CSFW
2002
IEEE
15 years 7 months ago
Types and Effects for Asymmetric Cryptographic Protocols
We present the first type and effect system for proving authenticity properties of security protocols based on asymmetric cryptography. The most significant new features of our ...
Andrew D. Gordon, Alan Jeffrey
ACISP
2009
Springer
15 years 7 months ago
Random Order m-ary Exponentiation
This paper describes a m-ary exponentiation algorithm where the radix-m digits of an exponent can be treated in a somewhat random order without using any more group operations than...
Michael Tunstall