• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 754
Next 10 →

Entity Authentication and Key Distribution

by Mihir Bellare, Phillip Rogaway , 1993
"... Entity authentication and key distribution are central cryptographic problems in distributed computing -- but up until now, they have lacked even a meaningful definition. One consequence is that incorrect and inefficient protocols have proliferated. This paper provides the first treatment of these p ..."
Abstract - Cited by 578 (13 self) - Add to MetaCart
Entity authentication and key distribution are central cryptographic problems in distributed computing -- but up until now, they have lacked even a meaningful definition. One consequence is that incorrect and inefficient protocols have proliferated. This paper provides the first treatment

Entity Authentication and Authenticated Key

by Exchange With Tree, Markus Volkmer , 2006
"... This paper provides the first analytical and practical treatment of entity authentication and authenticated key exchange in the framework of Tree Parity Machines (TPMs). The interaction of TPMs has been discussed as an alternative concept for secure symmetric key exchange. Several attacks have b ..."
Abstract - Add to MetaCart
This paper provides the first analytical and practical treatment of entity authentication and authenticated key exchange in the framework of Tree Parity Machines (TPMs). The interaction of TPMs has been discussed as an alternative concept for secure symmetric key exchange. Several attacks have

Remarks on entity authentication

by Tri Van Le, Mike Burmester , 2006
"... We analyze five basic entity authentication protocols in the security models proposed by Bellare–Rogaway and Canetti–Krawczyk and show that each model captures disparate aspects of entity authentication. ..."
Abstract - Add to MetaCart
We analyze five basic entity authentication protocols in the security models proposed by Bellare–Rogaway and Canetti–Krawczyk and show that each model captures disparate aspects of entity authentication.

Principles for Entity Authentication

by Michele Bugliesi, Riccardo Focardi, Matteo Maffei, Fabio Tudone - In Proceedings of 5th International Conference Perspectives of System Informatics (PSI 2003 , 2003
"... We study the roles of message components in authentication protocols. In particular, we investigate how a certain component contributes to the task of achieving entity authentication. To this aim, we isolate a minimal set of roles that enables us to extract general principles that should be follow ..."
Abstract - Cited by 11 (6 self) - Add to MetaCart
We study the roles of message components in authentication protocols. In particular, we investigate how a certain component contributes to the task of achieving entity authentication. To this aim, we isolate a minimal set of roles that enables us to extract general principles that should

Located Entity Authentication

by A Ca, Foscari Di Venezia, Via Torino, Riccardo Focardi, Riccardo Focardi , 1998
"... Entity authentication should allow the verification of an entity's claimed identity, by another entity [4]. In the last years a number of definitions of entity authentication have been proposed (see, e.g., [1, 5, 8]). We show that with these notions of authentication it is not possible to verif ..."
Abstract - Add to MetaCart
Entity authentication should allow the verification of an entity's claimed identity, by another entity [4]. In the last years a number of definitions of entity authentication have been proposed (see, e.g., [1, 5, 8]). We show that with these notions of authentication it is not possible

Unconditionally Secure Entity Authentication

by Kaoru Kurosawa , 1998
"... This paper studies the entity-authentication problem in an information theoretic framework, where adversaries are infinitely powerful. We first derive lower bounds on the cheating probability and the size of keys. Next, we show an unconditionally secure and optimum entity-authentication scheme that ..."
Abstract - Add to MetaCart
This paper studies the entity-authentication problem in an information theoretic framework, where adversaries are infinitely powerful. We first derive lower bounds on the cheating probability and the size of keys. Next, we show an unconditionally secure and optimum entity-authentication scheme

Is entity authentication necessary?

by Chris J. Mitchell, Paulo S. Pagliusi
"... Abstract. Conventionally, mutual entity authentication is seen as the necessary precursor to the establishment of a secure connection. However, there exist examples of cases where authentication is not needed. The purpose of this paper is to consider this proposition, illustrated by case studies, an ..."
Abstract - Add to MetaCart
Abstract. Conventionally, mutual entity authentication is seen as the necessary precursor to the establishment of a secure connection. However, there exist examples of cases where authentication is not needed. The purpose of this paper is to consider this proposition, illustrated by case studies

Entity Authentication and Key Distribution

by Phillip Rogawayy
"... Abstract Entity authentication and key distribution are central cryptographic problems in distributed computing--but up until now, they have lacked even a meaningful definition. One consequence is that incorrect and inefficient protocols have proliferated. This paper provides the first treatment of ..."
Abstract - Add to MetaCart
Abstract Entity authentication and key distribution are central cryptographic problems in distributed computing--but up until now, they have lacked even a meaningful definition. One consequence is that incorrect and inefficient protocols have proliferated. This paper provides the first treatment

ENTITY AUTHENTICATION USING

by Public Key Cryptography, Shukri Wakid Director , 1997
"... Standards and Technology (NIST) is the official series of publications relating to standards and guidelines ..."
Abstract - Add to MetaCart
Standards and Technology (NIST) is the official series of publications relating to standards and guidelines

Limitations of Challenge-Response Entity Authentication

by Chris Mitchell - Electronic Letters , 1989
"... Abstract We consider two basic versions of the challenge-response authentication protocol, and exhibit both a method of attack and a simple modification preventing such attacks. We go on to consider three variants of the basic protocols, and show that one of them is completely insecure. ..."
Abstract - Cited by 11 (0 self) - Add to MetaCart
Abstract We consider two basic versions of the challenge-response authentication protocol, and exhibit both a method of attack and a simple modification preventing such attacks. We go on to consider three variants of the basic protocols, and show that one of them is completely insecure.
Next 10 →
Results 1 - 10 of 754
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University