搜索结果: 1-4 共查到“军事学 identity-based authenticated key exchange”相关记录4条 . 查询时间(0.171 秒)
A Pairing-Free, One Round Identity Based Authenticated Key Exchange Protocol Secure Against Memory-Scrapers
Trusted Platform Module identity-based authenticated key exchange
2016/4/7
Security of a key exchange protocol is formally established through an abstract game between a challenger and an adversary. In this game the adversary can get various information which are modeled by ...
IBAKE: Identity-Based Authenticated Key Exchange Protocol
cryptographic protocols / Identity-based Authenticated Key Exchange
2012/6/14
The past decade has witnessed a surge in exploration of cryptographic concepts based on pairings over Elliptic Curves. In particular, identity-based cryptographic protocols have received a lot of atte...
IBAKE: Identity-Based Authenticated Key Exchange Protocol
cryptographic protocols / Identity-based Authenticated Key Exchange
2012/3/22
The past decade has witnessed a surge in exploration of cryptographic concepts based on pairings over Elliptic Curves. In particular, identity-based cryptographic protocols have received a lot of atte...
IBAKE: Identity-Based Authenticated Key Exchange Protocol
cryptographic protocols Identity-based Authenticated Key Exchange
2012/3/21
The past decade has witnessed a surge in exploration of cryptographic concepts based on pairings over Elliptic Curves. In particular, identity-based cryptographic protocols have received a lot of atte...