Pages that link to "Item:Q1872784"
From MaRDI portal
The following pages link to Protocols for authentification and key establishment (Q1872784):
Displayed 28 items.
- Authenticated commutator key agreement protocol (Q338834) (← links)
- Signal-flow-based analysis of wireless security protocols (Q385716) (← links)
- A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols (Q507654) (← links)
- Distributed temporal logic for the analysis of security protocol models (Q549724) (← links)
- Provably secure identity-based authenticated key agreement protocols with malicious private key generators (Q621645) (← links)
- On integrating confidentiality and functionality in a formal method (Q736833) (← links)
- Security weakness in a three-party pairing-based protocol for password authenticated key exchange (Q865906) (← links)
- An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices (Q884001) (← links)
- FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes (Q895004) (← links)
- Cryptographic protocol logic: satisfaction for (timed) Dolev-Yao cryptography (Q953531) (← links)
- An improved identity-based key agreement protocol and its security proof (Q1007846) (← links)
- Authenticated confidential channel establishment and the security of TLS-DHE (Q1698403) (← links)
- Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing (Q2259603) (← links)
- Invariant-based reasoning about parameterized security protocols (Q2268473) (← links)
- Protocol Composition Logic (PCL) (Q2864155) (← links)
- Structural Vulnerability and Robustness in Complex Networks: Different Approaches and Relationships Between them (Q2917207) (← links)
- Remote IP Protection Using Timing Channels (Q2942840) (← links)
- Robust biometric-based three-party authenticated key establishment protocols (Q2995506) (← links)
- Key Establishment Using Signcryption Techniques (Q3000038) (← links)
- An algebraic approach to the verification of a class of Diffie-Hellman protocols (Q3435341) (← links)
- Trust-Rated Authentication for Domain-Structured Distributed Systems (Q3506351) (← links)
- Provably secure key establishment protocol using one-way functions (Q3561509) (← links)
- On Establishing and Fixing a Parallel Session Attack in a Security Protocol (Q3613472) (← links)
- Towards Denial-of-Service-Resilient Key Agreement Protocols (Q3634508) (← links)
- Post-Quantum Constant-Round Group Key Exchange from Static Assumptions (Q4964367) (← links)
- A Bird’s-Eye View of Modern Symmetric Cryptography from Combinatorial Designs (Q5261011) (← links)
- A New Anonymous Password-Based Authenticated Key Exchange Protocol (Q5504623) (← links)
- The "Elliptic" matrices and a new kind of cryptography (Q6154738) (← links)