A Study on Asymmetric Key Exchange (original) (raw)
Related papers
A Comparison Study on Key Exchange-Authentication Protocol
ijcaonline.org
A Novel Password Protected Key Exchange Protocol
Santosh Naidu, P R SANTOSH NAIDU CSE, JNTUK UCEV
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
Lecture Notes in Computer Science, 2001
A Review Based Study of Key Exchange Algorithms
A New Authenticated Key Agreement Protocol
New Technologies, Mobility and Security
An ID-based authenticated three-party key exchange protocol
ACCENTS Transactions on Information Security, 2017
A Secure Authenticated Key Exchange Protocol for Credential Services
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2008
ijmer.com
Strengthening the security of key exchange protocols
2014
A Taxonomy and Comparison of Two-Party Key Agreement Protocols
International Journal of Research in Engineering and Technology, 2016
Arcanum : A Secure and Efficient Key Exchange Protocol for the Internet
2004
Public Key Infrastructure: A Survey
Scientific Research Publishing
A Cryptographic Keys Transfer Protocol for Secure Communicating Systems
Comparison of existing key establishment protocol
KIISC (CISC 2000), 2000
Authenticated Key Agreement Protocols: A Comparative Study
Scientific Research Publishing
Analysis of Key Exchange Protocols using Session Keys
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2007
Secure Authenticated Key Exchange Protocol for Credential Services
DESIDOC Journal of Library & Information Technology, 2009
Secure and efficient key management in mobile ad hoc networks
Journal of Network and Computer Applications, 2007
MUTUAL AUTHENTICATION AND SECURE KEY DISTRIBUTION IN DISTRIBUTED COMPUTING ENVIRONMENT
IAEME Publication, 2020
An enhanced password authenticated key exchange protocol without server public keys
2012 International Conference on ICT Convergence (ICTC), 2012
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems
Lecture Notes in Computer Science, 2013
Security Verification for Authentication and Key Exchange Protocols, Revisited
2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops, 2010
The Journal of Supercomputing, 2014
Efficient and Secure Authenticated Key Exchange Protocols in the eCK Model
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2011
The KryptoKnight family of light-weight protocols for authentication and key distribution
IEEE/ACM Transactions on Networking, 1995