Kościelny et al., 2013 - Google Patents
Cryptographic ProtocolsKościelny et al., 2013
- Document ID
- 1109749050687902613
- Author
- Kościelny C
- Kurkowski M
- Srebrny M
- Publication year
- Publication venue
- Modern Cryptography Primer: Theoretical Foundations and Practical Applications
External Links
Snippet
This chapter gives some examples of cryptographic protocols that are interesting and important from practical, theoretical, historical and didactical points of view. It also presents the problem of the correctness and security of such protocols. It is now known that several …
- 238000000034 method 0 description 21
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3823—Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Bera et al. | Designing blockchain-based access control protocol in IoT-enabled smart-grid system | |
| AU2021206913B2 (en) | Systems and methods for distributed data sharing with asynchronous third-party attestation | |
| Lux et al. | Distributed-ledger-based authentication with decentralized identifiers and verifiable credentials | |
| Lim et al. | Blockchain technology the identity management and authentication service disruptor: a survey | |
| Malik et al. | Federated identity management (FIM): Challenges and opportunities | |
| Gupta et al. | A formal proximity model for RBAC systems | |
| Sharma et al. | Advanced multi-factor user authentication scheme for E-governance applications in smart cities | |
| Soler et al. | A privacy-preserving key transmission protocol to distribute QRNG keys using zk-SNARKs | |
| Paquin | U-prove technology overview v1. 1 | |
| Al Hamadi et al. | Verifying mutual authentication for the DLK protocol using ProVerif tool | |
| Kumar | Using automated model analysis for reasoning about security of web protocols | |
| Veeningen et al. | Formal privacy analysis of communication protocols for identity management | |
| Kumagai et al. | Distributed Public Key Certificate‐Issuing Infrastructure for Consortium Certificate Authority Using Distributed Ledger Technology | |
| Albogami et al. | Public key infrastructure traditional and modern implementation | |
| Ren et al. | BIA: A blockchain-based identity authorization mechanism | |
| Liang et al. | An efficient blockchain-based anonymous authentication and supervision system | |
| Augusto et al. | OFELIA–A secure mobile attribute aggregation infrastructure for user-centric identity management | |
| Jin et al. | An efficient blockchain-based authentication scheme with transferability | |
| Rehman et al. | Securing cloud storage by remote data integrity check with secured key generation | |
| Li et al. | Publicly Traceable Attribute‐Based Anonymous Authentication and Its Application to Voting | |
| Rajamanickam et al. | Insider Attack Prevention: LAPUP—Lightweight Authentication Protocol Using PUF | |
| Al-Hamadi et al. | A novel protocol for security of location based services in multi-agent systems | |
| Kościelny et al. | Cryptographic Protocols | |
| Buccafurri et al. | Allowing privacy-preserving fog computing with digital identity assurance in remote clinical services | |
| CN114005190B (en) | Face recognition method for class attendance system |