Sciweavers

153 search results - page 13 / 31
» Multi-factor Authenticated Key Exchange
Sort
View
IJNSEC
2008
69views more  IJNSEC 2008»
13 years 7 months ago
Proof of Forward Security for Password-based Authenticated Key Exchange
Recently, M. Abdalla et al. proposed a slightly different variant of AuthA, based on the scheme proposed by E. Bresson et al., and provided the first complete proof of forward-sec...
Shuhua Wu, Yuefei Zhu
JOC
2006
67views more  JOC 2006»
13 years 7 months ago
Threshold Password-Authenticated Key Exchange
Philip D. MacKenzie, Thomas Shrimpton, Markus Jako...
CRYPTO
2005
Springer
113views Cryptology» more  CRYPTO 2005»
14 years 1 months ago
Secure Communications over Insecure Channels Based on Short Authenticated Strings
Abstract. We propose a way to establish peer-to-peer authenticated communications over an insecure channel by using an extra channel which can authenticate very short strings, e.g....
Serge Vaudenay
ACSAC
2000
IEEE
14 years 2 days ago
A Novel Approach to On-Line Status Authentication of Public-Key Certificates
The widespread use of public networks, such as the Internet, for the exchange of sensitive data, like legally valid documents and business transactions, poses severe security cons...
Eugenio Faldella, Marco Prandini