Sciweavers

1116 search results - page 13 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
AFRICACRYPT
2009
Springer
14 years 2 months ago
Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness
Michel Abdalla, Dario Catalano, Céline Chev...
ASIAN
2006
Springer
126views Algorithms» more  ASIAN 2006»
13 years 11 months ago
Certificateless Authenticated Two-Party Key Agreement Protocols
Tarjei K. Mandt, Chik How Tan
COMPSEC
2006
78views more  COMPSEC 2006»
13 years 7 months ago
Efficient remote mutual authentication and key agreement
Wen-Gong Shieh, Jian-Min Wang
SASN
2003
ACM
14 years 27 days ago
Location-based pairwise key establishments for static sensor networks
Sensor networks are ideal candidates for applications such as target tracking and environment monitoring. Security in sensor networks is critical when there are potential adversar...
Donggang Liu, Peng Ning
DCC
2008
IEEE
14 years 7 months ago
Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
LaMacchia, Lauter and Mityagin recently presented a strong security definition for authenticated key agreement strengthening the well-known Canetti-Krawczyk definition. They also ...
Berkant Ustaoglu