• No results found

public key based protocol

A  SECURE WEB BASED WATERMARKING SCHEME

A SECURE WEB BASED WATERMARKING SCHEME

... web based digital contents distributed over the ...web based content providers for preserving the integrity of their ...scheme based on the combination of the security of the public key ...

9

Cross-Domain  Password-Based  Authenticated  Key  Exchange  Revisited

Cross-Domain Password-Based Authenticated Key Exchange Revisited

... of public key certificates issued by a trusted certificate authority (CA), or the associated domain authentication servers share a long-term secret ...authenticated key exchange (4PAKE) ...have ...

31

A. The Diffie-Hellman protocol

A. The Diffie-Hellman protocol

... cryptographic public-key exchange protocol that allow key agreement between sensor nodes implemented in an FPGA-type embedded architecture based on modified Diffie-Hellman ...

5

ABSTRACT: In this paper we propose a new secure E-Voting protocol based on public-key encryption cryptosystem.

ABSTRACT: In this paper we propose a new secure E-Voting protocol based on public-key encryption cryptosystem.

... E-Voting protocol based on public-key encryption ...RSA public key encryption ...proposed protocol is more efficient than the others E-Voting ...voting protocol, ...

7

The  Double  Ratchet:  Security  Notions,  Proofs,   and  Modularization  for  the  Signal  Protocol

The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol

... Signal protocol is its real-world practicality: besides allowing for immediate decryption, it also uses only a small amount of local storage to keep state, is built from a collection of standard and widely ...

56

Magic  Adversaries  Versus  Individual  Reduction:  Science  Wins  Either  Way

Magic Adversaries Versus Individual Reduction: Science Wins Either Way

... that public-coin concurrent zero knowledge can be obtained with logarith- mic ...knowledge protocol based on indistinguishability obfuscation with super-polynomial ...existence public-coin ...

28

Hybrid Quantum Classical Key Distribution

Hybrid Quantum Classical Key Distribution

... proposed protocol we are interested in determining the number of the parameters around the final ...the public keys this does not mean he can calculate the final key because he needs to know the ...

6

Fault  attacks  on  pairing-based  protocols  revisited

Fault attacks on pairing-based protocols revisited

... pairing-based protocol where the fault attacks are ...is public (or the ratio of two such pairing values, one or both of which are ...a public- key encryption (PKE) scheme [10], an ...

16

A Privacy Preserving Grouping Proof Protocol Based on ECC with Untraceability for RFID

A Privacy Preserving Grouping Proof Protocol Based on ECC with Untraceability for RFID

... designed based on symmetric-key ...the key distribution problem that needs all parties to have shared the same key in a secure and au- thenticated channel before the secure communication hap- ...

6

Electronic Document Secure Management System Based on Content Analysis for Enterprise

Electronic Document Secure Management System Based on Content Analysis for Enterprise

... access protocol (LDAP), and Public key infrastructure (PKI) ...the public key based encryption, digital signature, and the key and certificate automatic management to ...

7

Vol 1, No 7 (2013)

Vol 1, No 7 (2013)

... session key which can be generated by the key establishment protocol and it can also be refers as the key agreement ...the key agreement the first famous protocol developed by ...

5

Key Management Mechanism and Authentication Impact on Network Layers

Key Management Mechanism and Authentication Impact on Network Layers

... identity based scheme (public key distribution scheme) for generation of complex values of every users after ...efficient key management protocol based on enhanced ...

8

Abstract Internet Key Exchange (IKE) protocol is the most

Abstract Internet Key Exchange (IKE) protocol is the most

... secret key negotiation protocol usable for IKE implementation based on PKIX in elliptic curve ...ECC based public keys of any entity in a chaining fashion from leave nodes towards the ...

6

A search-based approach to the automated design of security protocols

A search-based approach to the automated design of security protocols

... N; key is vk mod ( 2N + C 2 N ) (N principals may have N private keys, N public keys, and share C 2 N symmetric keys); the first belief in the message is belief vb 1 mod T ...feasible protocol ...

103

NTRU-KE:  A  Lattice-based  Public  Key  Exchange  Protocol

NTRU-KE: A Lattice-based Public Key Exchange Protocol

... Abstract. Public key exchange protocol is identified as an important application in the field of public-key ...existing public key exchange schemes are Diffie-Hellman ...

12

Data Security and Authentication using                      Steganography and STS protocol

Data Security and Authentication using Steganography and STS protocol

... Public key cryptography uses asymmetric key algorithms be referred to by the more generic name of "asymmetric key ...for public key cryptography are based on ...

7

Secure Distributed Key Generation on Vector Space Access Structures in Bilinear Groups

Secure Distributed Key Generation on Vector Space Access Structures in Bilinear Groups

... of public key and private key are elements from bilinear groups, thus distributed key generation protocol in bilinear groups is an essential component of such ...distributed key ...

6

An Adaptive Key Management Framework for the Wireless Mesh and Sensor Networks

An Adaptive Key Management Framework for the Wireless Mesh and Sensor Networks

... shared key. One attractive idea in the pairwise key man- agement is key pre-distribution, ...group key man- agement protocols [15-17], the key idea is to broadcast information that is ...

9

A Trust Based Routing Protocol with Key Management

A Trust Based Routing Protocol with Key Management

... In MANET, the nodes are constantly moving and have no fixed topology. The proposed trust management method improves the MANET security. Malicious nodes in the network are detected by calculating trust value of each node. ...

7

Everlasting  Multi-Party  Computation

Everlasting Multi-Party Computation

... A protocol has everlasting security if it is secure against adversaries that are computationally unlimited after the protocol ...protocols based on common reference strings, but not protocols us- ing ...

53

Show all 10000 documents...

Related subjects