ON THE STRUCTURE OF SECRET KEY EXCHANGE PROTOCOLS

被引:0
|
作者
BELLARE, M
COWEN, L
GOLDWASSER, S
机构
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
引用
收藏
页码:604 / 605
页数:2
相关论文
共 50 条
  • [31] Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
    Gorantla, M. Choudary
    Boyd, Colin
    Gonzalez Nieto, Juan Manuel
    Manulis, Mark
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2011, 14 (04) : 1 - 24
  • [32] Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
    Gorantla, M. Choudary
    Boyd, Colin
    Gonzalez Nieto, Juan Manuel
    PUBLIC KEY CRYPTOGRAPHY-PKC 2009, PROCEEDINGS, 2009, 5443 : 105 - 123
  • [33] Group Secret Key Generation in Physical Layer, Protocols and Achievable Rates
    Tang, Tianyu
    Jiang, Ting
    Zou, Weixia
    2017 17TH INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES (ISCIT), 2017,
  • [34] EFFICIENT KEY CONSTRUCTION ON SEMI-QUANTUM SECRET SHARING PROTOCOLS
    Yang, Chun-Wei
    Hwang, Tzonelih
    INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2013, 11 (05)
  • [35] 'Secret protocols'
    Sidebottom, Harry
    TLS-THE TIMES LITERARY SUPPLEMENT, 2006, (5385): : 23 - 23
  • [36] Secret Key Amplification from Uniformly Leaked Key Exchange Complete Graph
    Sasaki, Tatsuya
    Agbor, Bateh Mathias
    Masuda, Shingo
    Hayashi, Yu-ichi
    Mizuki, Takaaki
    Sone, Hideaki
    WALCOM: ALGORITHMS AND COMPUTATION, WALCOM 2018, 2018, 10755 : 20 - 31
  • [37] Fast and Automatic Verification of Authentication and Key Exchange Protocols
    Ota, Haruki
    Kiyomoto, Shinsaku
    Miyake, Yutaka
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (04): : 1 - 13
  • [38] Security Analysis of Broadcaster Group Key Exchange Protocols
    LI Li~ 1
    2. School of Computer
    Wuhan University Journal of Natural Sciences, 2006, (06) : 1577 - 1580
  • [39] Certificateless and Identity based Authenticated Key Exchange Protocols
    Badrinarayanan, Saikrishna
    Rangan, C. Pandu
    E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2014, 2015, 554 : 255 - 277
  • [40] Fast and Automatic Verification of Authentication and Key Exchange Protocols
    Ota, Haruki
    Kiyomoto, Shinsaku
    Tanaka, Toshiaki
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN P2P SYSTEMS (AP2PS 2010), 2010, : 7 - 13