Sciweavers

65 search results - page 10 / 13
» Efficient Client-to-Client Password Authenticated Key Exchan...
Sort
View
ESORICS
1998
Springer
14 years 3 months ago
Authentication and Payment in Future Mobile Systems
Abstract. This article presents an efficient public-key protocol for mutual authentication and key exchange designed for third generation mobile communications systems. The paper a...
Günther Horn, Bart Preneel
SP
1997
IEEE
139views Security Privacy» more  SP 1997»
14 years 2 months ago
Number Theoretic Attacks on Secure Password Schemes
Encrypted Key Exchange (EKE) [1, 2] allows two parties sharing a password to exchange authenticated information over an insecure network by using a combination of public and secre...
Sarvar Patel
ICICS
2010
Springer
13 years 8 months ago
Efficient Authentication for Mobile and Pervasive Computing
With today's technology, many applications rely on the existence of small devices that can exchange information and form communication networks. In a significant portion of su...
Basel Alomair, Radha Poovendran
IJNSEC
2006
110views more  IJNSEC 2006»
13 years 11 months ago
Password-based Encrypted Group Key Agreement
This paper presents an efficient password-based authenticated encrypted group key agreement protocol immune to dictionary attack under the computation Diffie-Hellman (CDH) assumpt...
Ratna Dutta, Rana Barua
CRYPTO
2005
Springer
113views Cryptology» more  CRYPTO 2005»
14 years 4 months ago
Secure Communications over Insecure Channels Based on Short Authenticated Strings
Abstract. We propose a way to establish peer-to-peer authenticated communications over an insecure channel by using an extra channel which can authenticate very short strings, e.g....
Serge Vaudenay