Implementation of Internet Key Exchange Protocol
碩士 === 國立臺灣大學 === 電機工程學研究所 === 92 === When the Internet has grown in the past ten years, more and more people communicate with their friends over the Internet. But Internet does not provide privacy; this means that a perpetrator may observe confidential data when the data traverses the Internet. A p...
Main Authors: | Huai-Hsien Chen, 陳懷先 |
---|---|
Other Authors: | Sy-Yen Kuo |
Format: | Others |
Language: | en_US |
Published: |
2004
|
Online Access: | http://ndltd.ncl.edu.tw/handle/61507602852405847722 |
Similar Items
-
Certificateless authenticated key exchange protocol for Internet of Things
by: Chia-Rong Hsieh, et al.
Published: (2019) -
An Analysis and Design of Internet Key Exchange Protocol - For Denial-of-Service Attack
by: Chia-Feng Chang, et al.
Published: (2006) -
On the security of key exchange protocols
by: Williams, Stephen C.
Published: (2011) -
MAKE-IT—A Lightweight Mutual Authentication and Key Exchange Protocol for Industrial Internet of Things
by: Karanjeet Choudhary, et al.
Published: (2020-09-01) -
LAKE-IoD: Lightweight Authenticated Key Exchange Protocol for the Internet of Drone Environment
by: Muhammad Tanveer, et al.
Published: (2020-01-01)