Sciweavers

5891 search results - page 156 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
ACNS
2004
Springer
156views Cryptology» more  ACNS 2004»
15 years 9 months ago
One-Round Protocols for Two-Party Authenticated Key Exchange
Cryptographic protocol design in a two-party setting has often ignored the possibility of simultaneous message transmission by each of the two parties (i.e., using a duplex channe...
Ik Rae Jeong, Jonathan Katz, Dong Hoon Lee
MIDDLEWARE
2007
Springer
15 years 10 months ago
Security issues with the IP multimedia subsystem (IMS)
Michael T. Hunter, Russell J. Clark, Frank S. Park
EDOC
2006
IEEE
15 years 10 months ago
Information Security Guidance for Enterprise Transformation
John A. Anderson, Vijaykumar Rachamadugu
HOTI
2005
IEEE
15 years 10 months ago
Internet Infrastructure Security
G. Manimaran, Basheer Al-Duwairi
GCC
2004
Springer
15 years 9 months ago
Security Architecture for Web Services
Yuan Rao, Boqin Feng, Jincang Han