A Study on Asymmetric Key Exchange (original) (raw)

A Comparison Study on Key Exchange-Authentication Protocol

Ian Chai, Sin-Ban Ho

ijcaonline.org

View PDFchevron_right

A Novel Password Protected Key Exchange Protocol

Santosh Naidu, P R SANTOSH NAIDU CSE, JNTUK UCEV

View PDFchevron_right

Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels

Ran Canetti

Lecture Notes in Computer Science, 2001

View PDFchevron_right

A Review Based Study of Key Exchange Algorithms

Mukesh Kumar

View PDFchevron_right

A New Authenticated Key Agreement Protocol

Kee-Won Kim

New Technologies, Mobility and Security

View PDFchevron_right

An ID-based authenticated three-party key exchange protocol

Susmita Mandal

ACCENTS Transactions on Information Security, 2017

View PDFchevron_right

A Secure Authenticated Key Exchange Protocol for Credential Services

Hideki Imai

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2008

View PDFchevron_right

A New Scheme for Key Exchange

Debajit Sensarma

ijmer.com

View PDFchevron_right

Strengthening the security of key exchange protocols

Michele Feltz

2014

View PDFchevron_right

A Taxonomy and Comparison of Two-Party Key Agreement Protocols

Asha Jyothi

International Journal of Research in Engineering and Technology, 2016

View PDFchevron_right

Arcanum : A Secure and Efficient Key Exchange Protocol for the Internet

Ashraf Masood

2004

View PDFchevron_right

Public Key Infrastructure: A Survey

Scientific Research Publishing

View PDFchevron_right

A Cryptographic Keys Transfer Protocol for Secure Communicating Systems

Traian MUNTEAN

View PDFchevron_right

Comparison of existing key establishment protocol

Boyeon Song

KIISC (CISC 2000), 2000

View PDFchevron_right

Authenticated Key Agreement Protocols: A Comparative Study

Scientific Research Publishing

View PDFchevron_right

Analysis of Key Exchange Protocols using Session Keys

Pranav Vyas

View PDFchevron_right

An Efficient and Leakage-Resilient RSA-Based Authenticated Key Exchange Protocol with Tight Security Reduction

Hideki Imai

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2007

View PDFchevron_right

Secure Authenticated Key Exchange Protocol for Credential Services

Dr. R Balakrishna

DESIDOC Journal of Library & Information Technology, 2009

View PDFchevron_right

Secure and efficient key management in mobile ad hoc networks

Jie Wu

Journal of Network and Computer Applications, 2007

View PDFchevron_right

MUTUAL AUTHENTICATION AND SECURE KEY DISTRIBUTION IN DISTRIBUTED COMPUTING ENVIRONMENT

IAEME Publication

IAEME Publication, 2020

View PDFchevron_right

An enhanced password authenticated key exchange protocol without server public keys

Hamid Karimnejad

2012 International Conference on ICT Convergence (ICTC), 2012

View PDFchevron_right

ASICS: Authenticated Key Exchange Security Incorporating Certification Systems

Michele Feltz

Lecture Notes in Computer Science, 2013

View PDFchevron_right

Security Verification for Authentication and Key Exchange Protocols, Revisited

Shinsaku Kiyomoto

2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops, 2010

View PDFchevron_right

A secure and efficient identity-based authenticated key exchange protocol for mobile client–server networks

mahmoud ahmadian Attari

The Journal of Supercomputing, 2014

View PDFchevron_right

Efficient and Secure Authenticated Key Exchange Protocols in the eCK Model

Moti Yung

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2011

View PDFchevron_right

The KryptoKnight family of light-weight protocols for authentication and key distribution

Amir Herzberg

IEEE/ACM Transactions on Networking, 1995

View PDFchevron_right

An Analysis Of Session Key Exchange Protocols

Pranav Vyas

View PDFchevron_right