Nothing Special   »   [go: up one dir, main page]

×
Please click here if you are not redirected within a few seconds.
We propose two public-key schemes to achieve “deniable authentication” for the Internet Key Exchange (IKE). Our protocols can be implemented using different ...
Mike Roe: I don't really like using absolute deniability as opposed to plausible deniability. We called it plausible deniability in the beginning partly as ...
We propose two public-key schemes to achieve “deniable authentication” for the Internet Key Exchange (IKE). Our protocols can be implemented using different ...
This paper presents a deniable authenticated key agreement protocol. This protocol can provide an authenticated session key while the sender and the receiver ...
Mar 4, 2024 · We propose two public-key schemes to achieve “deniable authentication” for the Internet Key Exchange (IKE). Our protocols can be implemented ...
We propose two public-key schemes to achieve “deniable authentication” for the Internet Key Exchange (IKE). Our protocols can be implemented using different ...
Electronic commerce applications such as electronic voting system, online shopping and online negotiation system may require a deniable authentication protocol.
Missing: (Discussion). | Show results with:(Discussion).
Apr 2, 2003 · Mike Roe: I don't really like using absolute deniability as opposed to plausible deniability. We called it plausible deniability in the ...
Missing: (Discussion). | Show results with:(Discussion).
Improved variants of both Boyd et al.'s schemes are put forward in order to defeat the KCI attack and a detailed security analysis is presented to ensure ...
Wenbo Mao: Deniable Authenticated Key Establishment for Internet Protocols (Discussion). Security Protocols Workshop 2003: 272-273. manage site settings.