Sciweavers

1116 search results - page 19 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
GI
2001
Springer
14 years 4 days ago
A Simple Key Distribution Method for IEEE 802.11 Encryption Keys
This article proposes a simple key management protocol for the distribution of shared session keys in IEEE 802.11 wireless LANs. For this purpose an individual key for each user i...
Günter Schäfer, Michael Eyrich
UC
2007
Springer
14 years 1 months ago
Quantum Authenticated Key Distribution
Quantum key distributionalgorithmsuse a quantum communicationchannel with quantum information and a classical communication channel for binary information. The classical channel, ...
Naya Nagy, Selim G. Akl
CEAS
2006
Springer
13 years 11 months ago
Algorithmically Determining Store-and-Forward MTA Relays Using DomainKeys
Store-and-forward MTA relaying servers have frequently presented problems to various antispam techniques, such as IPbased reputation or email authentication. Algorithms that find ...
Miles Libbey, Peter Ludemann
CSREASAM
2006
13 years 9 months ago
The Analyses of Key Stroke Timings using Self Organizing Maps and its Application to Authentication
Recently, security of the computer systems becomes an important problem. Almost all computers use the password mechanism for the user authentication. But password mechanism has ma...
Hiroshi Dozono, Yoshio Noguchi, Masanori Nakakuni,...
TCC
2007
Springer
104views Cryptology» more  TCC 2007»
14 years 1 months ago
Unifying Classical and Quantum Key Distillation
Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantum) systems prepared jointly according to a tripartite state ρABE. In addition, ...
Matthias Christandl, Artur Ekert, Michal Horodecki...