Filters








15,021 Hits in 5.2 sec

Tightly-Secure Authenticated Key Exchange [chapter]

Christoph Bader, Dennis Hofheinz, Tibor Jager, Eike Kiltz, Yong Li
<span title="">2015</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We construct the first Authenticated Key Exchange (AKE) protocol whose security does not degrade with an increasing number of users or sessions.  ...  Along the way we develop new, stronger security definitions for digital signatures and key encapsulation mechanisms.  ...  A Tightly-Secure AKE Protocol Secure Authenticated Key-Exchange In this section we present a formal security model for authenticated key-exchange (AKE) protocols.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-46494-6_26">doi:10.1007/978-3-662-46494-6_26</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mtiwizqx45a4jgktnjwrshmlmm">fatcat:mtiwizqx45a4jgktnjwrshmlmm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170808222212/https://eprint.iacr.org/2014/797.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/df/82/df82e89dc41fabf853fb625a58ae2f82ad51d388.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-46494-6_26"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange [chapter]

Kristian Gjøsteen, Tibor Jager
<span title="">2018</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
However, for many important cryptographic primitives, including digital signatures and authenticated key exchange (AKE), we are still lacking constructions that are suitable for real-world deployment.  ...  This additional message is used to overcome a technical difficulty in constructing tightly-secure AKE protocols.  ...  Tightly-Secure Authenticated Key Exchange Modern security models for authenticated key exchange consider very strong adversaries, which control the entire communication network, may adaptively corrupt  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-96881-0_4">doi:10.1007/978-3-319-96881-0_4</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vly43n24jvehhfyc3ihpswstta">fatcat:vly43n24jvehhfyc3ihpswstta</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190222210832/http://pdfs.semanticscholar.org/3cb1/6f426627af54f5689d537e6c7023e3742fa8.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/3c/b1/3cb16f426627af54f5689d537e6c7023e3742fa8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-96881-0_4"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Tightly-Secure Authenticated Key Exchange without NAXOS' Approach Based on Decision Linear Problem

Mojahed Mohamed, Xiaofen Wang, Xiaosong Zhang
<span title="">2016</span> <i title="Scientific Research Publishing, Inc,"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/gk5ai2y7zbf7teoyfzukkz3any" style="color: black;">OALib</a> </i> &nbsp;
Design secure Authenticated Key Exchange (AKE) protocol without NAXOS approach is remaining as an open problem.  ...  We fasten our security using games sequences tool which gives tight security for our protocol.  ...  Introduction An Authenticated Key Exchange protocol (AKE) allows two parties to end up with a shared secret key in secure and authenticated manner.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4236/oalib.1103033">doi:10.4236/oalib.1103033</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ihqfxeip45finep4tfuvsgxd6e">fatcat:ihqfxeip45finep4tfuvsgxd6e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170715221657/https://eprint.iacr.org/2016/388.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/04/e4/04e4f2606a8ee4e6327230dcf8ac48db72b46001.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4236/oalib.1103033"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Internet security architecture

Refik Molva
<span title="">1999</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/blfmvfslmbggxhopuigjdb3jma" style="color: black;">Computer Networks</a> </i> &nbsp;
The paper is addressed to readers with a basic understanding of common security mechanisms including encryption, authentication and key exchange techniques.  ...  First the IPsec architecture including security protocols in the Internet Layer and the related key management proposals are introduced.  ...  The key exchange protocol is also tightly coupled with an authentication exchange using nonces.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/s1389-1286(98)00016-4">doi:10.1016/s1389-1286(98)00016-4</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7c4yhcoytva43jiqf2lynojlte">fatcat:7c4yhcoytva43jiqf2lynojlte</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170921235946/http://www.eurecom.fr/~nsteam/Papers/pap04.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7b/24/7b24aa024ca2037b097cfcb2ea73a60ab497b80e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/s1389-1286(98)00016-4"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> elsevier.com </button> </a>

Network Integration in 3G and 4G Wireless Networks

Michael Lin, Heesook Choi, Travis Dawson, Thomas La Porta
<span title="">2010</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/3x67lwnpmjf6xcsnrggez3gqqe" style="color: black;">2010 Proceedings of 19th International Conference on Computer Communications and Networks</a> </i> &nbsp;
tightly-and loosely-coupled network integration levels, as well as a proactive handoff scheme that takes advantage of our tightly-coupled interworking.  ...  Wireless authentication across 3G and 4G data networks is typically an arduous task, requiring complete disconnection from the existing network before performing a lengthy full authentication on the new  ...  We adapt the 3GPP2 key exchange procedure in our CDMA-WiMAX interworking.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/icccn.2010.5560048">doi:10.1109/icccn.2010.5560048</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/icccn/LinCDP10.html">dblp:conf/icccn/LinCDP10</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/jsxada7elfbvbei4rxh7222jky">fatcat:jsxada7elfbvbei4rxh7222jky</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20120617074946/http://www.cse.psu.edu:80/~molin/network_integration.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7d/ce/7dce722d1884b0f809e7e025d078623f7838b92b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/icccn.2010.5560048"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Efficient ID-Based Password Authenticated Key Exchange Using Multiple Server

GOPIGA P
<span title="2018-03-31">2018</span> <i title="International Journal for Research in Applied Science and Engineering Technology (IJRASET)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/hsp44774azcezeyiq4kuzpfh5a" style="color: black;">International Journal for Research in Applied Science and Engineering Technology</a> </i> &nbsp;
Keywords: Password-authenticated key exchange, identity based signature, Diffiee -Hellman key exchange, dictionary attacks. I.  ...  But if two servers are accord by an attacker the password is not secure. To solve this problem, to establish ID based multi-server password authentication key exchange protocol.  ...  Fig: Multi-server Password Authentication Key Exchange arrangement includes part secret key between two or more servers.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.22214/ijraset.2018.3247">doi:10.22214/ijraset.2018.3247</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/r6f6xct35fdixo7ezyagi7vqva">fatcat:r6f6xct35fdixo7ezyagi7vqva</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200208023016/http://ijraset.com/fileserve.php?FID=14437" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1a/e6/1ae6f67d1080fe676b01dded0f23e279ac869bf3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.22214/ijraset.2018.3247"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Analysis of Security methods in Internet of Things

Saranya C
<span title="">2015</span> <i title="Auricle Technologies, Pvt., Ltd."> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/xzi23k3yufelpolr4dcpkbpjke" style="color: black;">International Journal on Recent and Innovation Trends in Computing and Communication</a> </i> &nbsp;
In this paper describes the analysis of security methods in the area of IoT and also describes a protocol which combines zero knowledge proof and key exchange algorithm to provide secure and authenticated  ...  The protocol is combines with the zero knowledge protocol and a key exchange algorithm to provide secure and authenticated communication that can be applied in IOT.  ...  In this paper proposes a new method which provides security, privacy, integrity and authentication among peers in static devices. It is based on Zero knowledge protocol and key exchange algorithm.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17762/ijritcc2321-8169.150446">doi:10.17762/ijritcc2321-8169.150446</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/cx7woa2b7jhwjgl2gxofbv5j7i">fatcat:cx7woa2b7jhwjgl2gxofbv5j7i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180602014610/http://www.ijritcc.org/download/1429528713.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/69/e7/69e7e0be10eda0e16bce8aed8acfe6a1d9c48cfb.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17762/ijritcc2321-8169.150446"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Security authentication of 3G-WLAN interworking

Yao Zhao, Chuang Lin, Hao Yin
<span title="">2006</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/6fvrx6ji2nauffetsxyi4abwam" style="color: black;">20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA&#39;06)</a> </i> &nbsp;
high end-to-end security and authentication for the users.  ...  Several authentication protocols have been proposed to improve security.  ...  EAP-TTLS allows arbitrary functions beyond authentication and key exchange to be added to the EAP negotiation, in a manner compatible with the AAA infrastructure.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/aina.2006.300">doi:10.1109/aina.2006.300</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/aina/ZhaoLY06.html">dblp:conf/aina/ZhaoLY06</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/capc2vww7rcwpok5lurteh3jha">fatcat:capc2vww7rcwpok5lurteh3jha</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20061101051041/http://personal.stevens.edu:80/~wyang/Security%20authentication%20of%203G-WLAN%20interworking.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b5/06/b50642af1040d01e463c89c97ece408603b65065.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/aina.2006.300"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Demo abstract: Securing communication in 6LoWPAN with compressed IPsec

Shahid Raza, Simon Duquennoy, Thiemo Voigt, Utz Roedig
<span title="">2011</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/zyhr6ql53ffubizi3tzi66anja" style="color: black;">2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS)</a> </i> &nbsp;
Recently, wireless sensor networks and traditional IP networks are more tightly integrated using IPv6 and 6LoWPAN. Real-world deployments of WSN demand secure communication.  ...  Available IPv6 protocol stacks can use IPsec to secure data exchanges. Thus, it is desirable to extend 6LoWPAN such that IPsec communication with IPv6 nodes is possible.  ...  Unlike hopby-hop solutions, it includes a key exchange mechanism and provides authentication in addition to confidentiality and integrity.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/dcoss.2011.5982146">doi:10.1109/dcoss.2011.5982146</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/dcoss/RazaDVR11.html">dblp:conf/dcoss/RazaDVR11</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/wcorelkfofhihn7rzxyigh6n3i">fatcat:wcorelkfofhihn7rzxyigh6n3i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170811010135/http://shahidraza.net/pdf/ipsec_demo_dcoss11.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c5/9b/c59b46003488a8839143bd70c74c08e15190a608.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/dcoss.2011.5982146"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Algorithms for Lightweight Key Exchange †

Rafael Alvarez, Cándido Caballero-Gil, Juan Santonja, Antonio Zamora
<span title="2017-06-27">2017</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/taedaf6aozg7vitz5dpgkojane" style="color: black;">Sensors</a> </i> &nbsp;
We benchmark several public-key key-exchange algorithms, determining those that are better for the requirements of critical infrastructure and emergency applications and propose a security framework based  ...  Some secure protocols, especially those that enable forward secrecy, make a much heavier use of public-key cryptography, increasing the demand for lightweight cryptosystems that can be implemented in low  ...  Caballero-Gil and Santonja focused on the cryptographic primitive analysis while Alvarez and Zamora focused on the security framework and overall research and experiment revision.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/s17071517">doi:10.3390/s17071517</a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pubmed/28654006">pmid:28654006</a> <a target="_blank" rel="external noopener" href="https://pubmed.ncbi.nlm.nih.gov/PMC5551094/">pmcid:PMC5551094</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/flpdvvq4bfcupn2ralx2hiptbq">fatcat:flpdvvq4bfcupn2ralx2hiptbq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180719110153/https://rua.ua.es/dspace/bitstream/10045/67607/1/2017_Alvarez_etal_Sensors.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/9a/6d/9a6d080f4e85e9923cbe629fd224a26e01af638c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/s17071517"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5551094" title="pubmed link"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> pubmed.gov </button> </a>

Secure and Light Weight Elliptic Curve Cipher Suites in SSL/TLS

B. Arunkumar, G. Kousalya
<span title="">2022</span> <i title="Computers, Materials and Continua (Tech Science Press)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/pu36lprddffgdbdb5n2qwfvaxa" style="color: black;">Computer systems science and engineering</a> </i> &nbsp;
The paper also recommends the best elliptic curve cipher suites for E-Commerce and online banking servers, based on their power consumption, handshake execution time, and key exchange and signature verification  ...  The user should be pleased with the confidentiality, authentication, and authenticity properties of the SSL/TLS on both the user's web browser and the remote E-commerce web server.  ...  The Key Exchange Algorithms are responsible for secure key exchange between the sender and recipient (say Client and Server).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.32604/csse.2022.018166">doi:10.32604/csse.2022.018166</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3m7lyvsklbcjncmtek4tfaziza">fatcat:3m7lyvsklbcjncmtek4tfaziza</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220224001641/https://www.techscience.com/ueditor/files/csse/TSP_CSSE-40-1/TSP_CSSE_18166/TSP_CSSE_18166.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/5d/1c/5d1c63549330757b322bdb8eb91c1dd0a1b43d62.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.32604/csse.2022.018166"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

On the Tight Security of TLS 1.3: Theoretically Sound Cryptographic Parameters for Real-World Deployments

Denis Diemert, Tibor Jager
<span title="2021-06-04">2021</span> <i title="Springer Science and Business Media LLC"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/7jmi32x7o5hfnpkgh2irnuqpim" style="color: black;">Journal of Cryptology</a> </i> &nbsp;
Our work also shows that by replacing the RSA-PSS scheme with a tightly secure scheme (e.g., in a future TLS version), one can obtain the first fully tightly secure TLS protocol.  ...  In this work, we provide a new security proof for the cryptographic core of TLS 1.3 in the random oracle model, which reduces the security of TLS 1.3 tightly (that is, with constant security loss) to the  ...  Constructing tightly secure authenticated key exchange protocols has turned out to be a difficult task. The first tightly secure AKE protocols were proposed by [4] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s00145-021-09388-x">doi:10.1007/s00145-021-09388-x</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vhz6kgeejfd7tgfvbowgjbrfne">fatcat:vhz6kgeejfd7tgfvbowgjbrfne</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210718112022/https://link.springer.com/content/pdf/10.1007/s00145-021-09388-x.pdf?error=cookies_not_supported&amp;code=bc260072-1827-4272-b20a-024b1ec62feb" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ef/7a/ef7aeeda290166487783cfa57089508ed12d012d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s00145-021-09388-x"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> springer.com </button> </a>

ROSS: Low-Cost Self-Securing VoIP Communication Framework

Alfin Syafalni
<span title="">2012</span> <i title="Korean Society for Internet Information (KSII)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/hupfbobgkvepdnt5g32qxkypsy" style="color: black;">KSII Transactions on Internet and Information Systems</a> </i> &nbsp;
Elliptic Curve Diffie-Hellman (ECDH) key exchange and Salsa20 stream cipher are utilized in the framework correspondingly to secure the key agreement and the communication with low computational cost.  ...  A reliable security protocol and an authentication scheme are thus required to prevent the aforementioned threats. However, an authentication scheme often demands additional cost and effort.  ...  PKI has a better authentication scheme because it binds the user's identity tightly to the respective public key in the digital certificate.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3837/tiis.2012.12.019">doi:10.3837/tiis.2012.12.019</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/yn5r7pycf5hzxaqfue4i7x2eyu">fatcat:yn5r7pycf5hzxaqfue4i7x2eyu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220226013627/http://itiis.org/digital-library/manuscript/file/20239/TIIS_Vol6No12P19Dec2012.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a0/ce/a0cef14ff9d0210db07c642c9627dbd63dafe2f6.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3837/tiis.2012.12.019"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Authentication across heterogeneous networks

Miroslav Živković, Milind M. Buddhikot, Ko Lagerberg, Jeroen van Bemmel
<span title="2005-08-03">2005</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/23yxxvfhojanzkfj7qe62wehlm" style="color: black;">Bell Labs technical journal</a> </i> &nbsp;
Furthermore, some access technologies may support a plethora of authentication protocols, making selection of the appropriate method(s) of authentication challenging for an end user.  ...  Our solution integrates a number of authentication mechanisms and does not require any end-user interactions while roaming, thus enabling a seamless roaming experience.  ...  exchange; and • EAPOL-Key packets, which are used to set up various keys used in the user session, such as keys for encryption, message authentication, and anonymity.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1002/bltj.20093">doi:10.1002/bltj.20093</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/h5zwo65ipjdgfddznex24zuv4e">fatcat:h5zwo65ipjdgfddznex24zuv4e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809055459/https://www.bell-labs.com/usr/milind.buddhikot/www/psdocs/BellLabs-Tech-EapSim-Summer05.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/78/5b/785b69d320e2c7629df5a15c9a812b5e304c5600.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1002/bltj.20093"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Page 6320 of Mathematical Reviews Vol. , Issue 2002H [page]

<span title="">2002</span> <i title="American Mathematical Society"> <a target="_blank" rel="noopener" href="https://archive.org/details/pub_mathematical-reviews" style="color: black;">Mathematical Reviews </a> </i> &nbsp;
Summary: “The security of authentication protocols based on public key cryptography depends on the validity of the certificate.  ...  In contrast, in the original systems the user keys were tightly connected with the escrow authorities’ key.  ... 
<span class="external-identifiers"> </span>
<a target="_blank" rel="noopener" href="https://archive.org/details/sim_mathematical-reviews_2002-08_2002h/page/6320" title="read fulltext microfilm" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Archive [Microfilm] <div class="menu fulltext-thumbnail"> <img src="https://archive.org/serve/sim_mathematical-reviews_2002-08_2002h/__ia_thumb.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 15,021 results