Sciweavers

1490 search results - page 22 / 298
» The Logic of Authentication Protocols
Sort
View
133
Voted
SACI
2007
IEEE
15 years 10 months ago
Implementation of an Authentication Protocol for Sending Audio-Video Information in Java
— an application for assuring the authenticity of audio-video information is developed. The application is implemented in Java by using Java Media Framework to send audio and vid...
Bogdan Groza, Dorina Petrica, Simona Barbu, Marian...
140
Voted
IJNSEC
2008
146views more  IJNSEC 2008»
15 years 3 months ago
Formal Protocol Design of ESIKE Based on Authentication Tests
In this paper, we first present a concrete formal protocol design approach, which is based on authentication tests, to create an Efficient and Secure Internet Key Exchange (ESIKE)...
Rui Jiang, Aiqun Hu, Jianhua Li
119
Voted
ICICS
2005
Springer
15 years 9 months ago
Security Properties of Two Authenticated Conference Key Agreement Protocols
In this paper we analyse the security of two authenticated group key agreement schemes based on the group key agreement protocol of Burmester and Desmedt. One scheme was proposed ...
Qiang Tang, Chris J. Mitchell
97
Voted
DCC
2003
IEEE
16 years 3 months ago
An Efficient Protocol for Authenticated Key Agreement
Laurie Law, Alfred Menezes, Minghua Qu, Jerome A. ...
126
Voted
JCS
2006
74views more  JCS 2006»
15 years 3 months ago
On the impossibility of building secure Cliques-type authenticated group key agreement protocols
The A-GDH.2 and SA-GDH.2 authenticated group key agreement
Olivier Pereira, Jean-Jacques Quisquater