نتایج جستجو برای: key exchange

تعداد نتایج: 727500  

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده ادبیات و علوم انسانی 1391

abstract global financial crisis has created too many problems in relations among governments. among these problems, the issue of global monetary management, more than every time in the past four decades, has been moved in the center of international economic attentions. a problem which is specially known with the monetary hostility between united states and public republic of china. where ar...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد مرودشت - دانشکده علوم تربیتی و روانشناسی 1393

type text or a website address or translate a document. abstract liquidity is considered the most important aspect of the development of stock markets. the main objective of this study was to evaluate the effect of the quality of financial information provided to replace its financial statements nmvdh and shrkt hayy that the liquidity of the shares on the tehran stock exchange is between the ...

2000
Niklas Hallqvist Angelos D. Keromytis

Journal: :IACR Cryptology ePrint Archive 2010
James Birkett Douglas Stebila

We provide the first description of and security model for authenticated key exchange protocols with predicate-based authentication. In addition to the standard goal of session key security, our security model also provides for credential privacy: a participating party learns nothing more about the other party’s credentials than whether they satisfy the given predicate. Our model also encompass...

Journal: :IACR Cryptology ePrint Archive 2009
Qingfeng Cheng Chuangui Ma

In ICA3PP 2009, Xinglan Zhang proposed two one-round authenticated key exchange protocols and proved their security in the standard model. In this paper, we analyze these two protocols and find that both of them exist some flaws.

Journal: :IACR Cryptology ePrint Archive 2015
Chunsheng Gu

Recently, Coron presented an attack of GGH15 multilinear maps, which breaks the multipartite Diffie-Hellman key exchange protocol based on GGH15. In this paper, we describe a variation of GGH15, which seems to thwart known attacks.

Journal: :International Journal of Pure and Apllied Mathematics 2014

Journal: :CoRR 2013
Ted Hurley

General cryptographic schemes are presented where keys can be one-time or ephemeral. Processes for key exchange are derived. Public key cryptographic schemes based on the new systems are established. Authentication and signature schemes are easy to implement. The schemes may be integrated with error-correcting coding schemes so that encryption/coding and decryption/decoding may be done simultan...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید