Secure key establishment
From MaRDI portal
Publication:951129
DOI10.1007/978-0-387-87969-7zbMATH Open1162.94006OpenAlexW81949417MaRDI QIDQ951129FDOQ951129
Authors: Kim-Kwang Raymond Choo
Publication date: 29 October 2008
Published in: Advances in Information Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-0-387-87969-7
Recommendations
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62)
Cited In (7)
- A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps
- Progress in Cryptology - INDOCRYPT 2004
- Protocols for authentication and key establishment
- Title not available (Why is that?)
- FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes
- Secret Key Generation With Limited Interaction
- Protocols for authentification and key establishment
This page was built for publication: Secure key establishment
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q951129)