Sciweavers

212 search results - page 1 / 43
» Further analysis of the Internet key exchange protocol
Sort
View
COMCOM
2000
143views more  COMCOM 2000»
13 years 7 months ago
Further analysis of the Internet key exchange protocol
Secure communication over the Internet becomes an essential requirement for any value-added Internet application. The use of cryptography for secure communication brings out the r...
Jianying Zhou
CSREASAM
2004
13 years 8 months ago
Experimental Analysis of the Arcanum Key Exchange Protocol
A VPN establishes a secure network using the insecure media of the Internet. However, before a VPN can be established keys must be exchanged between the communicating peers. In th...
Ajmal S. Mian, Raja Iqbal
SPW
2001
Springer
13 years 12 months ago
Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols
William Aiello, Steven M. Bellovin, Matt Blaze, Ra...
ACISP
2005
Springer
14 years 29 days ago
Analysis of the HIP Base Exchange Protocol
Abstract The Host Identity Protocol (HIP) is an Internet security and multiaddressing mechanism specified by the IETF. HIP introduces a new layer between the transport and network ...
Tuomas Aura, Aarthi Nagarajan, Andrei Gurtov
PKC
2009
Springer
129views Cryptology» more  PKC 2009»
14 years 8 months ago
Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
A key exchange protocol allows a set of parties to agree upon a secret session key over a public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed unde...
Colin Boyd, Juan Manuel González Nieto, M. ...