To search, Click below search items.
All Published Papers Search Service
Title
Security Verification for Authentication and Key Exchange Protocols
Author
Haruki Ota, Shinsaku Kiyomoto, Toshiaki Tanaka
Vol. 9 No. 3 pp. 1-11
Keywords
Security Verification Method, Authentication and Key Exchange Protocols, Verification Points, Bellare et al.'s Model, Ubiquitous Environment
Designing a Subliminal Channel for Deceiving Enhancement
Abdulameer K.Hussain
Vol. 9 No. 2 pp. 285-292
Cryptography, Authentication, Subliminal Channel , Digital Signature, Security
A Series-parallel XML Multisignature Scheme for XML Data Authentication
Baolong Liu, Joan Lu, Jim Yip
Vol. 9 No. 2 pp. 236-247
XML security, XML data authentication, XML multisignature, DSA, RSA
An Efficient Authentication Protocol Based on Elliptic Curve Cryptography for Mobile Networks
P.G.Rajeswari, K.Thilagavathi
Vol. 9 No. 2 pp. 176-185
Mobile Networks, Authentication Protocol, Pubic-key cryptography, Elliptic curves Elliptic Curve Cryptography (ECC), Key pair