Sciweavers

2472 search results - page 4 / 495
» Parallel Key Exchange
Sort
View
ICNC
2005
Springer
14 years 3 months ago
Adaptive Parallel Ant Colony Algorithm
: Two strategies for information exchange between processors in parallel ant colony algorithm are presented. Theses strategies can make each processor choose other processors to co...
Ling Chen, Chunfang Zhang
ACISP
2010
Springer
13 years 12 months ago
Predicate-Based Key Exchange
We provide the first description of and security model for authenticated key exchange protocols with predicate-based authentication. In addition to the standard goal of session ke...
James Birkett, Douglas Stebila
ASIACRYPT
2004
Springer
14 years 3 months ago
New Approaches to Password Authenticated Key Exchange Based on RSA
We investigate efficient protocols for password-authenticated key exchange based on the RSA public-key cryptosystem. To date, most of the published protocols for password-authentic...
Muxiang Zhang
EUROPAR
2005
Springer
14 years 3 months ago
On AAA Based on Brokers and Pre-encrypted Keys in MIPv6
For providing mobility services for users through the global Internet, Mobile IP (MIP) has been standardized by IETF. Since conventional MIP has been investigated without the suppo...
Hoseong Jeon, Min Young Chung, Hyunseung Choo
ACNS
2008
Springer
147views Cryptology» more  ACNS 2008»
14 years 4 months ago
Multi-factor Authenticated Key Exchange
Abstract. In order to increase the security for authenticated key exchange protocols, various authentication means can be used together. In this paper, we introduce a security mode...
David Pointcheval, Sébastien Zimmer