Protocols for authentification and key establishment
zbMath1043.68014MaRDI QIDQ1872784
Publication date: 15 May 2003
Published in: Information Security and Cryptography (Search for Journal in Brave)
confidentialitysecret sharingpublic key cryptographynumber theoryforward secrecycryptographic algorithmsdata integrityfreshnesskey agreement protocolsunknown key-share attackskey compromise impersonationattack on protocolscertificate manipulationconference key protocolsdata origin authenticationkey broadcastingkey establishment protocolskey transport protocolspassword-based protocolsprotocol architecturesprotocols for authenticationserver-based key establishmentshared key cryptography
Introductory exposition (textbooks, tutorial papers, etc.) pertaining to computer science (68-01) Cryptography (94A60) Network protocols (68M12) Authentication, digital signatures and secret sharing (94A62) Introductory exposition (textbooks, tutorial papers, etc.) pertaining to information and communication theory (94-01)
Related Items (28)
This page was built for publication: Protocols for authentification and key establishment