Mao et al., 2002 - Google Patents
On the plausible deniability feature of Internet protocolsMao et al., 2002
- Document ID
- 5014063509050379369
- Author
- Mao W
- Paterson K
- Publication year
- Publication venue
- Published online
External Links
- 238000000034 method 0 abstract description 18
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Odelu et al. | Provably secure authenticated key agreement scheme for smart grid | |
Jablon | Extended password key exchange protocols immune to dictionary attack | |
Mandt et al. | Certificateless authenticated two-party key agreement protocols | |
Baek et al. | Identity-based threshold decryption | |
Krawczyk | SIGMA: The ‘SIGn-and-MAc’approach to authenticated Diffie-Hellman and its use in the IKE protocols | |
JP4833489B2 (en) | System, method and software for remote password authentication using multiple servers | |
US6249585B1 (en) | Publicly verifiable key recovery | |
Hao et al. | Password authenticated key exchange by juggling | |
Xu et al. | K-anonymous secret handshakes with reusable credentials | |
EP1905186A2 (en) | Cryptographic authentication, and/or establishment of shared cryptographic keys, using a signing key encrypted with a non-one-time-pad encryption, including (but not limited to) techniques with improved security against malleability attacks | |
Abadi | Private authentication | |
Emura et al. | Secure and anonymous communication technique: Formal model and its prototype implementation | |
Abusukhon et al. | Efficient and secure key exchange protocol based on elliptic curve and security models | |
Kwon | Privacy preservation with X. 509 standard certificates | |
Mao et al. | On the plausible deniability feature of Internet protocols | |
Abobeah | Public-key cryptography techniques evaluation | |
Sun et al. | Password-based authentication and key distribution protocols with perfect forward secrecy | |
Oh et al. | How to solve key escrow and identity revocation in identity-based encryption schemes | |
Yang et al. | An improved two-party authentication key exchange protocol for mobile environment | |
Xu et al. | Comments on the SM2 key exchange protocol | |
Saadatmandan et al. | Digital Certificate of Public Key for User Authentication and Session Key Establishment for Secure Network Communications | |
Boyd | Enforcing traceability in software | |
Luo et al. | An enhanced authentication and key agreement mechanism for SIP using certificateless public-key cryptography | |
Zaw et al. | User authentication in SSL handshake protocol with zero-knowledge proof | |
Reddy | Fixing the generalized integrated Diffie-Hellman-DSA key exchange protocol |