An Optimal Three Parties Verifier-Based Key Agreement Protocol
碩士 === 國立勤益科技大學 === 資訊工程系 === 98 === Three–party key exchange protocols communications major application environment is that any two clients, they can verify the ability to use a server to establish communication between the two sides belong to the security of their communications channels, the past...
Main Authors: | Shen-Heng Huang, 黃信衡 |
---|---|
Other Authors: | Tsung-Hung Lin |
Format: | Others |
Language: | en_US |
Published: |
2010
|
Online Access: | http://ndltd.ncl.edu.tw/handle/89958796649721123365 |
Similar Items
-
Authenticated Key Agreement Protocol for Three Parties
by: Chang, Ku Yi, et al.
Published: (2006) -
The password authentication for the three-party key agreement protocol
by: Hsing-Chuan Lin, et al.
Published: (2016) -
Three-party Authentication Key Agreement Protocol Based on Chebyshev’s Polynomials
by: Yi-Fan Wang, et al.
Published: (2019) -
Communication-Efficient Three-Party Protocols for Authentication and Key Agreement
by: Meei-jiun Sung, et al.
Published: (2006) -
Three-party authenticated key agreements for optimal communication.
by: Tian-Fu Lee, et al.
Published: (2017-01-01)