Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Yahalom (protocol)

Known as: Yahalom 
Yahalom is an authentication and secure key-sharing protocol designed for use on an insecure network such as the Internet. Yahalom uses a trusted… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Previous research studies mostly focused on enhancing the security of radio frequency identification (RFID) protocols for various… Expand
  • figure 1
  • table 1
  • table 2
  • figure 2
  • table 3
Is this relevant?
2015
2015
This volume contains a series of provocative essays that explore expressions of magic and ritual power in the ancient world. The… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2006
2006
Symbolic secrecy of exchanged keys is arguably one of the most important notions of secrecy shown with automated proof tools. It… Expand
Is this relevant?
Highly Cited
2003
Highly Cited
2003
We perform a systematic expansion of protocol narrations into terms of process algebra in order to make precise some of the… Expand
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
2002
2002
As applications enabled by the Internet become information rich, ensuring access to quality information in the presence of… Expand
Is this relevant?
Highly Cited
2001
Highly Cited
2001
The Yahalom protocol is one of those analyzed by Burrows et al. [5]. Based upon their analysis, they have proposed modifications… Expand
Is this relevant?
2001
2001
Trust is essential to a communication channel. The trust relationships, which play an important role in Public Key… Expand
Is this relevant?
Highly Cited
2000
Highly Cited
2000
We describe our new results in developing and extending Automatic Protocol Generation (APG), an approach to automatically… Expand
  • figure 1
  • figure 2
  • figure 4
  • table 1
Is this relevant?
Highly Cited
1994
Highly Cited
1994
Authentication in open networks usually requires participation of trusted entities. Many protocols allow trust to be obtained by… Expand
Is this relevant?
1985
1985
Etudes de la relation entre le potentiel et l'epaisseur du film, dans le cas de films d'oxydes anodiques formes sur le titane… Expand
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Is this relevant?