Sciweavers

96 search results - page 9 / 20
» Efficient and secure protocol in fair document exchange
Sort
View
ISW
2010
Springer
13 years 5 months ago
Security Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents
We analyze the Extended Access Control (EAC) protocol for authenticated key agreement, recently proposed by the German Federal Office for Information Security (BSI) for the deploym...
Özgür Dagdelen, Marc Fischlin
ACMICEC
2003
ACM
104views ECommerce» more  ACMICEC 2003»
14 years 22 days ago
Document exchange model for augmenting added value of B2B collaboration
In this paper we present a B2B integration project, which aims to augment the added value of services instead of improving efficiency by automating processes. This paper introduce...
Koichi Hayashi, Riichiro Mizoguchi
CCS
2006
ACM
13 years 11 months ago
An intruder model for verifying liveness in security protocols
We present a process algebraic intruder model for verifying a class of liveness properties of security protocols. For this class, the proposed intruder model is proved to be equiv...
Jan Cederquist, Muhammad Torabi Dashti
TCOS
2010
13 years 2 months ago
J-PAKE: Authenticated Key Exchange without PKI
Password Authenticated Key Exchange (PAKE) is one of the important topics in cryptography. It aims to address a practical security problem: how to establish secure communication be...
Feng Hao, Peter Ryan
CSI
2004
110views more  CSI 2004»
13 years 7 months ago
A novel three-party encrypted key exchange protocol
The key exchange protocol is one of the most elegant ways of establishing secure communication between pair of users by using a session key. The passwords are of low entropy, henc...
Chin-Chen Chang, Ya-Fen Chang