Deniable Authentication on the Internet
From MaRDI portal
Publication:3600342
DOI10.1007/978-3-540-79499-8_24zbMATH Open1166.94338OpenAlexW1558002781MaRDI QIDQ3600342FDOQ3600342
Authors: Shaoquan Jiang
Publication date: 10 February 2009
Published in: Information Security and Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-79499-8_24
Recommendations
Cited In (19)
- A note on the Dwork-Naor timed deniable authentication
- Deniable ring authentication based on projective hash functions
- Deniable group communications in the presence of global unlimited adversary
- A deniable authenticated 2 party key agreement protocol from bilinear pairing
- An Efficient Deniable Key Exchange Protocol (Extended Abstract)
- On the security of SPLICE/AS -- The authentication system in WIDE Internet
- Composability and On-Line Deniability of Authentication
- Lightweight Email Signatures (Extended Abstract)
- Timed encryption with application to deniable key exchange
- Identity-based deniable authentication for ad hoc networks
- Applied Cryptography and Network Security
- Full and partial deniability for authentication schemes
- Deniable authentication when signing keys leak
- Deniable group key agreement
- Deniable RSA signature. The raise and fall of Ali Baba
- New approaches for deniable authentication
- Deniable internet key exchange
- A new framework for deniable secure key exchange
- A new approach for UC security concurrent deniable authentication
This page was built for publication: Deniable Authentication on the Internet
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3600342)