Sciweavers

261 search results - page 6 / 53
» On the Security of Some Password-Based Key Agreement Schemes
Sort
View
IJNSEC
2006
270views more  IJNSEC 2006»
13 years 7 months ago
Efficient Key Agreement for Large and Dynamic Multicast Groups
Secure multicast represents the core component of many web and multimedia applications such as pay-TV, teleconferencing, real-time distribution of stock market price and etc. The ...
Liming Wang, Chuan-Kun Wu
AMC
2005
172views more  AMC 2005»
13 years 7 months ago
An efficient nonce-based authentication scheme with key agreement
In this paper, we propose a cost effective mutual authentication scheme with key agreement using smart cards. Our scheme is motivated by the scheme design in two articles publishe...
Yen-Cheng Chen, Lo-Yao Yeh
ICDCS
2009
IEEE
14 years 4 months ago
Distributed Key Generation for the Internet
Although distributed key generation (DKG) has been studied for some time, it has never been examined outside of the synchronous setting. We present the first realistic DKG archit...
Aniket Kate, Ian Goldberg
AINA
2004
IEEE
13 years 11 months ago
Supervising Secret-Key Agreements in a Level-Based Hierarchy
A key agreement protocol is utilized in a network system such that two users are able to establish a commonly shared secret key. Entities within the same security level can commun...
Ching-Te Wang, Chu-Hsing Lin, Chin-Chen Chang
IPL
2006
87views more  IPL 2006»
13 years 7 months ago
Fast generators for the Diffie-Hellman key agreement protocol and malicious standards
The Diffie-Hellman key agreement protocol is based on taking large powers of a generator of a prime-order cyclic group. Some generators allow faster exponentiation. We show that to...
Boaz Tsaban