[LLIBRE][B] Handbook of applied cryptography

AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …

Secure group communications using key graphs

CK Wong, M Gouda, SS Lam - IEEE/ACM transactions on …, 2000 - ieeexplore.ieee.org
Many emerging network applications are based upon a group communications model. As a
result, securing group communications, ie, providing confidentiality, authenticity, and …

[PDF][PDF] Provably secure session key distribution: the three party case

M Bellare, P Rogaway - Proceedings of the twenty-seventh annual ACM …, 1995 - dl.acm.org
We study session key distribution in the ting of Needham and Schroeder.(This is three-party
setthe trust model assumed by the popular Kerberos“authentication system.) Such protocols …

Secure group communications using key graphs

CK Wong, M Gouda, SS Lam - ACM SIGCOMM Computer …, 1998 - dl.acm.org
Many emerging applications (eg, teleconference, real-time information services, pay per
view, distributed interactive simulation, and collaborative work) are based upon a group …

Data networks as cascades: Investigating the multifractal nature of Internet WAN traffic

A Feldmann, AC Gilbert, W Willinger - ACM SIGCOMM Computer …, 1998 - dl.acm.org
In apparent contrast to the well-documented self-similar (ie, monofractal) scaling behavior of
measured LAN traffic, recent studies have suggested that measured TCP/IP and ATM WAN …

Binding a digital license to a portable device or the like in a digital rights management (drm) system and checking out/checking in the digital license to/from the …

M Peinado - US Patent 7,073,063, 2006 - Google Patents
Architecture 10 decrypted to produce the content key (KD), and the public key (PU1) of the
first device is obtained therefrom. The content key (KD) is then encrypted according to the …

Security analysis and enhancements of 3GPP authentication and key agreement protocol

M Zhang, Y Fang - IEEE Transactions on wireless …, 2005 - ieeexplore.ieee.org
This paper analyzes the authentication and key agreement protocol adopted by Universal
Mobile Telecommunication System (UMTS), an emerging standard for third-generation (3G) …

Cryptanalysis of password authentication schemes: Current status and key issues

SK Sood, AK Sarje, K Singh - 2009 Proceeding of International …, 2009 - ieeexplore.ieee.org
Password is the most commonly used technique for user authentication due to its simplicity
and convenience. The main advantage of passwords is that users can memorize them easily …

Authentication in a packet data network

H Haverinen, JP Honkanen, A Kuikka… - US Patent …, 2006 - Google Patents
(51) Int. Cl. network together with a replay attack protector. The packet G06F 7/04(2006.01)
data network obtains authentication triplets, forms a session H04L 9/00(2006.01) key using …

Practical Intranet Security: Overview of the State of the Art and Available Technologies

PM Ashley, M Vandenwauver - 1999 - books.google.com
Foreword by Lars Knudsen Practical Intranet Security focuses on the various ways in which
an intranet can be violated and gives a thorough review of the technologies that can be used …