Sciweavers

28 search results - page 3 / 6
» Enhancements of authenticated multiple key exchange protocol...
Sort
View
ICCSA
2007
Springer
14 years 2 months ago
An Enhanced ID-Based Deniable Authentication Protocol on Pairings
Deniability is defined as a privacy property which enables protocol principals to deny their involvement after they had taken part in a particular protocol run. Lately, Chou et al....
Meng-Hui Lim, Sanggon Lee, Youngho Park, Hoonjae L...
ACISP
2005
Springer
14 years 2 months ago
Analysis of the HIP Base Exchange Protocol
Abstract The Host Identity Protocol (HIP) is an Internet security and multiaddressing mechanism specified by the IETF. HIP introduces a new layer between the transport and network ...
Tuomas Aura, Aarthi Nagarajan, Andrei Gurtov
SPW
2004
Springer
14 years 1 months ago
BLIND: A Complete Identity Protection Framework for End-Points
In this paper, we present a security framework that provides identity protection against active and passive attacks for end-points. The framework is based on a two-round-trip authe...
Jukka Ylitalo, Pekka Nikander
ICC
2009
IEEE
132views Communications» more  ICC 2009»
14 years 3 months ago
A Chaotic Maps-Based Key Agreement Protocol that Preserves User Anonymity
—A key agreement protocol is a protocol whereby two or more communicating parties can agree on a key or exchange information over an open communication network in such a way that...
Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang
CRYPTO
2005
Springer
113views Cryptology» more  CRYPTO 2005»
14 years 2 months ago
Secure Communications over Insecure Channels Based on Short Authenticated Strings
Abstract. We propose a way to establish peer-to-peer authenticated communications over an insecure channel by using an extra channel which can authenticate very short strings, e.g....
Serge Vaudenay