public key based protocol
A SECURE WEB BASED WATERMARKING SCHEME
9
Cross-Domain Password-Based Authenticated Key Exchange Revisited
31
A. The Diffie-Hellman protocol
5
ABSTRACT: In this paper we propose a new secure E-Voting protocol based on public-key encryption cryptosystem.
7
The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol
56
Magic Adversaries Versus Individual Reduction: Science Wins Either Way
28
Hybrid Quantum Classical Key Distribution
6
Fault attacks on pairing-based protocols revisited
16
A Privacy Preserving Grouping Proof Protocol Based on ECC with Untraceability for RFID
6
Electronic Document Secure Management System Based on Content Analysis for Enterprise
7
Vol 1, No 7 (2013)
5
Key Management Mechanism and Authentication Impact on Network Layers
8
Abstract Internet Key Exchange (IKE) protocol is the most
6
A search-based approach to the automated design of security protocols
103
NTRU-KE: A Lattice-based Public Key Exchange Protocol
12
Data Security and Authentication using Steganography and STS protocol
7
Secure Distributed Key Generation on Vector Space Access Structures in Bilinear Groups
6
An Adaptive Key Management Framework for the Wireless Mesh and Sensor Networks
9
A Trust Based Routing Protocol with Key Management
7
Everlasting Multi-Party Computation
53