• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 8,986
Next 10 →

Table 10: Beller-Yacobi Authenticated Key Transport Protocol

in Shortened digital signature, signcryption and compact and unforgeable Key agreement schemes
by Yuliang Zheng 1998
"... In PAGE 36: ...3.2.2 Comparison with Beller-Yacobi Protocol The next protocol we examine is an efficient proposal by Beller and Yacobi [6]. Their proto- col is briefly summarized in Table10 , using notations consistent with those for signcryption schemes. As is the case for our proposals based on signcryption, here it is assumed too that public key certificates have already been transferred prior to an execution of the protocol.... ..."

Table 10: Beller-Yacobi Authenticated Key Transport Protocol

in unknown title
by unknown authors 1998
"... In PAGE 36: ...3.2.2 Comparison with Beller-Yacobi Protocol The next protocol we examine is an e#0Ecient proposal by Beller and Yacobi #5B6#5D. Their proto- col is brie#0Dy summarized in Table10 , using notations consistent with those for signcryption schemes. As is the case for our proposals based on signcryption, here it is assumed too that public key certi#0Ccates have already been transferred prior to an execution of the protocol.... ..."

Table 10: Beller-Yacobi Authenticated Key Transport Protocol

in unknown title
by unknown authors
"... In PAGE 36: ...3.2.2 Comparison with Beller-Yacobi Protocol The next protocol we examine is an e cient proposal by Beller and Yacobi [6]. Their proto- col is brie y summarized in Table10 , using notations consistent with those for signcryption schemes. As is the case for our proposals based on signcryption, here it is assumed too that public key certi cates have already been transferred prior to an execution of the protocol.... ..."

Table 9: Beller-Yacobi Authenticated Key Transport Protocol

in Using Signcryption to Build Compact and Efficient Protocols for Unforgeable Session Key Establishment
by Yuliang Zheng, Hideki Imai
"... In PAGE 20: ....1.2 Comparison with Beller-Yacobi Protocol The next protocol we examine is an e cient proposal by Beller and Yacobi [3]. Their proto- col is brie y summarized in Table9 , using notations consistent with those for signcryption schemes. As is the case for our proposals based on signcryption, here it is assumed too that public key certi cates have already been transferred prior to an execution of the protocol.... ..."

Table 9: Beller-Yacobi Authenticated Key Transport Protocol

in Using Signcryption to Build Compact and Efficient Protocols for Unforgeable Session Key Establishment
by Yuliang Zheng, Hideki Imai
"... In PAGE 19: ....1.2 Comparison with Beller-Yacobi Protocol The next protocol we examine is an e cient proposal by Beller and Yacobi [3]. Their proto- col is brie y summarized in Table9 , using notations consistent with those for signcryption schemes. As is the case for our proposals based on signcryption, here it is assumed too that public key certi cates have already been transferred prior to an execution of the protocol.... ..."

Table 1. Proposed two-party authenticated key agreement protocol.

in A Provably Secure One-Pass Two-Party Key Establishment Protocol
by Konstantinos Chalkias, Spyros T. Halkidis, Dimitrios Hristu-varsakelis, Anastasios Alexiadis
"... In PAGE 5: ... Then, advantageE(k) = Pr[GoodGuessE(k)] 1 2 is negligible3. In the following we will show that the protocol described in Table1 is a secure OPAK protocol. 2 Intuitively, two oracles are said to have matching conversations if one of them is the initiator of an exchange of messages, and the messages sent by each of the two are identical to those received by the other, and are in the same temporal order.... In PAGE 6: ... Theorem 1. The protocol shown in Table1 is a secure OPAK protocol, provided that the CDH problem is computationally hard and H1, H2 are independent random oracles. Proof: See Appendix.... ..."

Table 3: Recommended key authenticity received by BT

in An Algebra for Assessing Trust in Certification Chains
by Audun Jøsang 1999
Cited by 9

Table 3: Recommended key authenticity received by A

in An Algebra for Assessing Trust in Certification Chains
by Audun Jøsang

Table 3.1: Parameters for A-codes with a totally secret authentication key

in CIP-DATA LIBRARY TECHNISCHE UNIVERSITEIT EINDHOVEN
by Shengli Liu, Liu Shengli, Eindhoven Technische

Table 12.3 Simulated performance comparison of round e cient authenticated key distribution protocols (values in milliseconds)

in Timestamps For Network Authentication Protocols Revisited
by Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng
Next 10 →
Results 1 - 10 of 8,986
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University