KEY MANAGEMENT SCHEME FOR END-TO-END ENCRYPTION AND A FORMAL VERIFICATION OF ITS SECURITY.

被引:0
|
作者
Kasami, Tadao
Yamamura, Saburo
Mori, Kenichi
机构
来源
Systems, computers, controls | 1982年 / 13卷 / 03期
关键词
Compendex;
D O I
暂无
中图分类号
学科分类号
摘要
4
引用
收藏
页码:59 / 69
相关论文
共 50 条
  • [1] Security Analysis and Countermeasures of an End-to-End Encryption Scheme of LINE
    Isobe, Takanori
    Minematsu, Kazuhiko
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) : 313 - 324
  • [2] SECURE COMMUNICATION IN INTERNET ENVIRONMENTS - A HIERARCHICAL KEY MANAGEMENT SCHEME FOR END-TO-END ENCRYPTION
    LU, WP
    SUNDARESHAN, MK
    IEEE TRANSACTIONS ON COMMUNICATIONS, 1989, 37 (10) : 1014 - 1023
  • [3] NOVEL KEY MANAGEMENT FOR 3G END-TO-END ENCRYPTION
    Wang, Jian
    Jiang, Nan
    Li, Hui
    Niu, Xinxin
    Yang, Yixian
    2009 GLOBAL MOBILE CONGRESS, 2009, : 161 - +
  • [4] Security Analysis of End-to-End Encryption for Zoom Meetings
    Isobe, Takanori
    Ito, Ryoma
    IEEE ACCESS, 2021, 9 : 90677 - 90689
  • [5] Security Analysis of End-to-End Encryption for Zoom Meetings
    Isobe, Takanori
    Ito, Ryoma
    INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 234 - 253
  • [6] The Many Faces of End-to-End Encryption and Their Security Analysis
    Nabeel, Mohamed
    2017 IEEE 1ST INTERNATIONAL CONFERENCE ON EDGE COMPUTING (IEEE EDGE), 2017, : 252 - 259
  • [7] End-to-End Verification of ARM® Processors with ISA-Formal
    Reid, Alastair
    Chen, Rick
    Deligiannis, Anastasios
    Gilday, David
    Hoyes, David
    Keen, Will
    Pathirane, Ashan
    Shepherd, Owen
    Vrabel, Peter
    Zaidi, Ali
    COMPUTER AIDED VERIFICATION: 28TH INTERNATIONAL CONFERENCE, CAV 2016, PT II, 2016, 9780 : 42 - 58
  • [8] Breaking Message Integrity of an End-to-End Encryption Scheme of LINE
    Isobe, Takanori
    Minematsu, Kazuhiko
    COMPUTER SECURITY (ESORICS 2018), PT II, 2018, 11099 : 249 - 268
  • [9] A Key Independence Group Key Management Scheme for Non-Reliable End-to-End Networks
    Zhou, Jian
    Sun, Liyan
    Huang, Shihua
    International Journal of Network Security, 2024, 26 (02) : 285 - 298
  • [10] DEVICE IDENTITY MANAGEMENT AND END-TO-END SECURITY
    Latour, Jacques
    D'Souza, Natasha
    IEEE NETWORK, 2021, 35 (05): : 8 - 9