Search

Your search keyword '"Oakley protocol"' showing total 497 results

Search Constraints

Start Over You searched for: Descriptor "Oakley protocol" Remove constraint Descriptor: "Oakley protocol"
497 results on '"Oakley protocol"'

Search Results

1. Enhancing the Oakley key agreement protocol with secure time information.

2. A general compiler for password-authenticated group key exchange protocol in the standard model

3. A Secure and Efficient Chaotic Maps Based Authenticated Key-Exchange Protocol for Smart Grid

4. Anonymous Password Authenticated Key Exchange Protocol in the Standard Model

5. A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps

7. Efficient ID-Based Authentication and Key Exchange Protocol

8. Password-Authenticated Group Key Exchange

9. Comment on a certificateless one-pass and two-party authenticated key agreement protocol

10. An Identity‐Based Group Key Agreement Protocol for Low‐Power Mobile Devices

11. Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks

12. Timestamp based Key Exchange Protocol for Satellite Access Network

13. An Efficient 3D Elliptic Curve Diffie–Hellman (ECDH) Based Two-Server Password-Only Authenticated Key Exchange Protocol with Provable Security

14. An authenticated group key transfer protocol using elliptic curve cryptography

15. TTP Based High-Efficient Multi-Key Exchange Protocol

16. A Pairing-Free Identity-Based Authenticated Key Agreement Protocol for MANET

17. A Three-Party Password-based Authenticated Key Exchange Protocol for Wireless Communications

18. Forsakes: A forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes

19. A provable authenticated group key agreement protocol for mobile environment

20. Cryptanalysis of a robust key agreement based on public key authentication

21. A new two-round dynamic authenticated contributory group key agreement protocol using elliptic curve Diffie–Hellman with privacy preserving public key infrastructure

22. Design of a password-based authenticated key exchange protocol for SIP

23. A Secure Wireless Communication Protocol using Diffie - Hellman Key Exchange

24. An improved smart card based authentication scheme for session initiation protocol

25. Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps

26. Provably secure one-round certificateless authenticated group key agreement protocol for secure communications

27. An Improved Two-Party Authentication Key Exchange Protocol for Mobile Environment

28. PF-ID-2PAKA: Pairing Free Identity-Based Two-Party Authenticated Key Agreement Protocol for Wireless Sensor Networks

29. Provably secure extended chaotic map-based three-party key agreement protocols using password authentication

30. A strongly secure identity-based authenticated group key exchange protocol

31. RYY ++ : A Novel Provably Secure Identity‐Based Authenticated Key Agreement Protocol

32. A provably secure and efficient two-party password-based explicit authenticated key exchange protocol resistance to password guessing attacks

33. Design of Two-Party Authenticated Key Agreement Protocol Based on ECC and Self-Certified Public Keys

34. Certificateless one-pass and two-party authenticated key agreement protocol and its extensions

35. Authenticated Key Agreement Protocol for Wireless Sensor Networks

36. An Improved NSSK Authentication Protocol and Its Formal Analysis

37. A Secure Pairing-Free Certificate-Less Authenticated Key Agreement Protocol

38. An authenticated key agreement protocol for cross-domain based on heterogeneous signcryption scheme

39. Diffie-Hellman Key Exchange Protocol with Entities Authentication

40. Improvement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server’s public key and smart card

41. Cryptanalysis and improvement of an efficient authenticated key exchange protocol with tight security reduction

42. Scalable protocol for cross-domain group password-based authenticated key exchange

43. Cryptanalysis of the Dragonfly key exchange protocol

44. Securing Bluetooth Communication with Hybrid Pairing Protocol

45. Buchmann-Williams Authenticated Key Agreement Protocol With Pre-shared Password

46. A chaotic map-based anonymous multi-server authenticated key agreement protocol using smart card

47. An efficient password-based three-party authenticated multiple key exchange protocol for wireless mobile networks

48. A secure and efficient identity-based authenticated key exchange protocol for mobile client–server networks

49. An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps

50. Cryptanalysis of smart-card-based password authenticated key agreement protocol for session initiation protocol of Zhang et al

Catalog

Books, media, physical & digital resources