Sciweavers

21 search results - page 1 / 5
» Strongly Secure Certificateless Key Agreement
Sort
View
PAIRING
2009
Springer
142views Cryptology» more  PAIRING 2009»
14 years 5 months ago
Strongly Secure Certificateless Key Agreement
Georg Lippold, Colin Boyd, Juan Manuel Gonzá...
CIS
2007
Springer
14 years 5 months ago
A New Provably Secure Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-Key Cryptography
The session initiation protocol (SIP) is considered as the dominant signaling protocol for calls over the internet. However, SIP authentication typically uses HTTP digest authentic...
Fengjiao Wang, Yuqing Zhang
PAIRING
2010
Springer
149views Cryptology» more  PAIRING 2010»
13 years 8 months ago
Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement
Abstract. We discuss the relationship between ID-based key agreement protocols, certificateless encryption and ID-based key encapsulation mechanisms. In particular we show how in s...
Dario Fiore, Rosario Gennaro, Nigel P. Smart
ISCI
2010
146views more  ISCI 2010»
13 years 8 months ago
Simulatable certificateless two-party authenticated key agreement protocol
Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to preve...
Lei Zhang 0009, Futai Zhang, Qianhong Wu, Josep Do...
IJNSEC
2008
145views more  IJNSEC 2008»
13 years 11 months ago
Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing
Most of the current security architectures for grid systems use conventional public key infrastructure (PKI) to authenticate grid members and to secure resource allocation to thes...
Shengbao Wang, Zhenfu Cao, Haiyong Bao