DC Field | Value | Language |
---|---|---|
dc.contributor.author | Song, Boyeon | ko |
dc.contributor.author | Kim, Kwangjo | ko |
dc.date.accessioned | 2010-04-15T06:45:07Z | - |
dc.date.available | 2010-04-15T06:45:07Z | - |
dc.date.created | 2012-02-06 | - |
dc.date.created | 2012-02-06 | - |
dc.date.issued | 2000-12 | - |
dc.identifier.citation | LECTURE NOTES IN COMPUTER SCIENCE, v.1977, no.58, pp.237 - 249 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | http://hdl.handle.net/10203/17755 | - |
dc.description.abstract | This paper proposes three key agreement protocols that emphasize their security and performance. First, the two-pass authenticated key agreement (AK) protocol is presented in the asymmetric setting, which is based on Diffie-Hellman key agreement working over an elliptic curve group and provides more desirable security attributes than the MTI/A0, two-pass Unified Model and two-pass MQV protocols. Other two protocols are modifications of this protocol: the three-pass authenticated key agreement with key confirmation (AKC) protocol which uses message authentication code (MAC) algorithms for key confirmation, and the two-pass authenticated key agreement protocol with unilateral key confirmation which uses the MAC and the signature. | - |
dc.language | English | - |
dc.language.iso | en_US | en |
dc.publisher | Springerlink | - |
dc.title | Two-Pass Authenticated Key Agreement Protocol with Key Confirmation | - |
dc.type | Article | - |
dc.type.rims | ART | - |
dc.citation.volume | 1977 | - |
dc.citation.issue | 58 | - |
dc.citation.beginningpage | 237 | - |
dc.citation.endingpage | 249 | - |
dc.citation.publicationname | LECTURE NOTES IN COMPUTER SCIENCE | - |
dc.embargo.liftdate | 9999-12-31 | - |
dc.embargo.terms | 9999-12-31 | - |
dc.contributor.localauthor | Kim, Kwangjo | - |
dc.contributor.nonIdAuthor | Song, Boyeon | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.