ON THE STRUCTURE OF SECRET KEY EXCHANGE PROTOCOLS

被引:0
|
作者
BELLARE, M
COWEN, L
GOLDWASSER, S
机构
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
引用
收藏
页码:604 / 605
页数:2
相关论文
共 50 条
  • [21] Security Verification for Authentication and Key Exchange Protocols
    Ota, Haruki
    Kiyomoto, Shinsaku
    Tanaka, Toshiaki
    2008 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, VOLS 1-3, 2008, : 507 - 512
  • [22] Scalable protocols for authenticated group key exchange
    Katz, Jonathan
    Yung, Moti
    JOURNAL OF CRYPTOLOGY, 2007, 20 (01) : 85 - 113
  • [23] Scalable protocols for authenticated group key exchange
    Katz, J
    Yung, M
    ADVANCES IN CRYPTOLOGY-CRYPTO 2003, PROCEEDINGS, 2003, 2729 : 110 - 125
  • [24] Application of the Fair Secret Exchange Protocols in the Distribution of Electronic Invoices
    Watrobski, Jaroslaw
    Karczmarczyk, Artur
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS, 2017, 112 : 1819 - 1828
  • [25] Defending Secret-Key Based Authentication Protocols against the Stolen-Secret Attack
    Sun, Hung-Min
    Wang, King-Hang
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 385 - 389
  • [26] A jigsaw puzzle based secret key exchange scheme
    Farn, En-Jung
    Chen, Chaur-Chin
    PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 3067 - +
  • [27] A Secret Key Exchange Scheme for Near Field Communication
    Severi, Stefano
    Abreu, Giuseppe
    Pasolini, Gianni
    Dardari, Davide
    2014 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2014, : 428 - 433
  • [28] On the average length of secret key exchange Eulerian circuits
    Mizuki, T
    Sui, ZB
    Shizuya, H
    Nishizeki, T
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2000, E83A (04) : 662 - 670
  • [29] Universal Multiparty Data Exchange and Secret Key Agreement
    Tyagi, Himanshu
    Watanabe, Shun
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2017, 63 (07) : 4057 - 4074
  • [30] Group key exchange protocols withstanding ephemeral-key reveals
    Gonzalez Vasco, Maria Isabel
    Perez del Pozo, Angel Luis
    Suarez Corona, Adriana
    IET INFORMATION SECURITY, 2018, 12 (01) : 79 - 86