Key authentication

Key authentication is used to solve the problem of authenticating the keys of the person (say "person B") to whom some other person ("person A") is… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1987-2017
0102019872017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2008
2008
We are now going to the 4G network and in the 4G network environment, there are so many devices connected to the Internet while… (More)
  • figure 1
  • figure 2
  • figure 4
  • table I
Is this relevant?
2008
2008
We propose a very low-cost authentication scheme based on Merkle signatures, which does not require any computation on the prover… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 2
  • figure 4
Is this relevant?
Highly Cited
2005
Highly Cited
2005
With the advance of technology, Public Key Cryptography (PKC) will sooner or later be widely used in wireless sensor networks… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests… (More)
Is this relevant?
2004
2004
It is proved that the LHL-key authentication scheme, proposed by Lee, Hwang and Li [Appl. Math. Comput. 139 (2003) 343], is… (More)
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Many modern computing environments involve dynamic peer groups. Distributed simulation, multiuser games, conferencing… (More)
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Denial of service by server resource exhaustion has become a major security threat in open communications networks. Public-key… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
1998
Highly Cited
1998
hlany modern computing environments involve dynamic peer groups. Distributed Simdation, mtiti-user games, conferencing and… (More)
Is this relevant?
Highly Cited
1996
Highly Cited
1996
We examine key agreement protocols providing (i) key au-thentication (ii) key connrmation and (iii) forward secrecy. Attacks are… (More)
Is this relevant?
Highly Cited
1995
Highly Cited
1995
In this paper we present an attack upon the Needham Schroeder public key authentication protocol The attack allows an intruder to… (More)
Is this relevant?