Sciweavers

632 search results - page 11 / 127
» Two Facets of Authentication
Sort
View
ASIAN
2006
Springer
126views Algorithms» more  ASIAN 2006»
14 years 1 months ago
Certificateless Authenticated Two-Party Key Agreement Protocols
Tarjei K. Mandt, Chik How Tan
CISC
2009
Springer
134views Cryptology» more  CISC 2009»
13 years 7 months ago
Weaknesses in Two Recent Lightweight RFID Authentication Protocols
Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan...
JSS
2006
65views more  JSS 2006»
13 years 9 months ago
Cryptanalysis of a hybrid authentication protocol for large mobile networks
In this paper we analyse a hybrid authentication protocol due to Chien and Jan, designed for use in large mobile networks. The proposed protocol consists of two sub-protocols, nam...
Qiang Tang, Chris J. Mitchell