搜索结果: 1-9 共查到“军事学 Session key”相关记录9条 . 查询时间(0.093 秒)
A Reduction-Based Proof for Authentication and Session Key Security in 3-Party Kerberos
Kerberos authenticated key exchange
font style='font-size:12px;'>
2019/7/10
Kerberos is one of the earliest network security protocols, providing authentication between clients and servers with the assistance of trusted servers. It remains widely used, notably as the default ...
Light-hHB: A New Version of hHB with Improved Session Key Exchange
BB84 LPN HB
font style='font-size:12px;'>
2015/12/24
This paper offers a new version of the hHB protocol denoted Light-hHB. This
proposal uses the same framework as hHB, that is a two stages protocol: the first
one for the establishment of a session k...
Rethinking Definitions of Security for Session Key Agreement
Key Exchange Definitions Public Key Infrastructure
font style='font-size:12px;'>
2013/4/18
We consider session key agreement (SKA) protocols operating in a public key infrastructure, with pre-specified peers, that take no session ID as input, and output only a session key. Despite much work...
Routing Protocol Based Shared and Session Key Exchange Protocol for Wireless Mobile Ad-hoc Network
secret-key cryptography / Key Exchange MANET routing
font style='font-size:12px;'>
2012/3/28
Mobile Ad-hoc Network (MANET) is a transitory and infrastructureless network supported by no fixed trusted infrastructure. To achieve security goals like: authentication, integrity, non-repudiation, p...
Routing Protocol Based Shared and Session Key Exchange Protocol for Wireless Mobile Ad-hoc Network
secret-key cryptography / Key Exchange MANET routing
font style='font-size:12px;'>
2011/6/8
Mobile Ad-hoc Network (MANET) is a transitory and infrastructureless network supported by no fixed trusted infrastructure. To achieve security goals like: authentication, integrity, non-repudiation, p...
Session-Key Generation using Human Passwords Only
Session-key generation mutual authentication protocols human-memorizable passwords
font style='font-size:12px;'>
2009/4/17
We present session-key generation protocols in a model where the legitimate parties share
only a human-memorizable password, and there is no additional setup assumption in the network.
Our protocol ...
Simpler Session-Key Generation from Short Random Passwords
Simpler Session-Key Generation Short Random Passwords
font style='font-size:12px;'>
2009/3/27
Simpler Session-Key Generation from Short Random Passwords.
On Session Key Construction in Provably-Secure Key Establishment Protocols:Revisiting Chen & Kudla (2003) and McCullagh & Barreto (2005) ID-Based Protocols
Session Key Construction Provably-Secure Key Establishment Protocols ID-Based Protocols
font style='font-size:12px;'>
2009/2/16
A Novel Secure Session Key Generation using two-level architecture For Cluster-Based Ad Hoc Networks Based On ID-Based Bilinear Paring
the NTDR network system PKI cluster-based ad hoc network system
font style='font-size:12px;'>
2008/8/28
In 1997, Ruppe R. et al [17] first proposed a Near-Term Digital Radio (NTDR)
network system which is a cluster-based ad hoc network intended to be used
efficiently for military missions. In the same...