Filters








6 Hits in 6.2 sec

An improved two-party identity-based authenticated key agreement protocol using pairings

Marko Hölbl, Tatjana Welzer, Boštjan Brumen
2012 Journal of computer and system sciences (Print)  
In this paper, we propose an efficient identity-based authenticated key agreement protocol employing pairings which employs a variant of a signature scheme and conforms to security attributes.  ...  Two-party authenticated key agreement protocols using pairings have gained much attention in the cryptographic community.  ...  We will show that his signature scheme can be employed to construct an identity-based authenticated key agreement protocol The proposed improved two-party identity-based authenticated key agreement protocol  ... 
doi:10.1016/j.jcss.2011.01.002 fatcat:g6vny7yhhvg6jbeulmk2bav7tq

A Study of Two-Party Certificateless Authenticated Key-Agreement Protocols [chapter]

Colleen Swanson, David Jao
2009 Lecture Notes in Computer Science  
We survey the set of all prior two-party certificateless key agreement protocols available in the literature at the time of this work.  ...  In order to describe our results rigorously, we introduce the first known formal security model for two-party authenticated certificateless key agreement protocols.  ...  Wang and Cao's protocol, whereas the MT protocol allows adversaries to easily replace public keys.  ... 
doi:10.1007/978-3-642-10628-6_4 fatcat:rerln3zqmvhxjhm2sw34ou24ly

Online) International Journal of Network Security is published both in traditional paper form

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+102 others)
2016 International Journal of Network Security   unpublished
In post-quantum cryptosystems, error correcting codes (ECC) help in code based cryptography for lightweight identification , authentication, distance bounding and tag with ownership transfer protocols  ...  attacks and improves the network performance as well.  ...  Acknowledgments The authors would like to thank the anonymous reviewers and the editor for their comments that will help them to improve this paper.  ... 
fatcat:ez6kvrzkuzg75nulaxycvfvxcq

Special Issue: Semantic Informational Technologies

Vladimir Fomichov, Anton Železnikar, Matjaž Gams, Jožef Stefan, Drago Torkar, Jožef Stefan, Editorial Board, Juan Carlos, Augusto, Argentina, Costin Badica, Romania (+20 others)
2010 unpublished
Key exchange protocols allow two or more parties communicating over a public network to establish a common secret key called a session key.  ...  We propose an automatic experimental protocol to measure the relevance of the provided concepts. The protocol helps alleviating the judgment effort of a human expert.  ...  The primary PR anonymisation is done by the Hospital Information System of the University Specialised Hospital for Active Treatment of Endocrinology "Acad. Acknowledgement  ... 
fatcat:wragndobczejtfiashj42sdi5q

Networked Professional Learning in Intercultural Language Education: A Case Study of a Small Connectivist Open Online Course (SCOOC) [article]

Nguyen Thi Khoi Bui, University, The Australian National, University, The Australian National
2019
With the growth of various open online learning formats, teacher professional learning is no longer an individualistic or school-based activity but networked learning that uses information and communication  ...  There is also a lack of research-based evidence on design principles for effective networked professional learning.  ...  An example is DeJaeghere & Cao's (2009) study which developed teachers' IC through district and school-based professional development programs.  ... 
doi:10.25911/5cc03b734eae7 fatcat:socsrcsb3bcs7iqtmy7iws6vwy

The sensual and the moral: "Kongzi shilun" 孔子詩論 as an exegesis of the Shijing 詩經

Daniel Sai Keung Lee
2022
that celebrate it, and espouses the use of li as a means of transcending human desires and regulating social and spiritual relations.  ...  Between the poiesis of qing and the bounds of li, "Kongzi shilun" has now bridged the gap left by the Han scholarship regarding the notion that germinates poetry.  ...  or certification‖(1991, 59); so are the emotions of the music and the thoughts of the lyrics.  ... 
doi:10.25949/19428299.v1 fatcat:ns5oxnnkc5cwhanjofllteuk4i