[go: up one dir, main page]

Kościelny et al., 2013 - Google Patents

Cryptographic Protocols

Kościelny et al., 2013

Document ID
1109749050687902613
Author
Kościelny C
Kurkowski M
Srebrny M
Publication year
Publication venue
Modern Cryptography Primer: Theoretical Foundations and Practical Applications

External Links

Snippet

This chapter gives some examples of cryptographic protocols that are interesting and important from practical, theoretical, historical and didactical points of view. It also presents the problem of the correctness and security of such protocols. It is now known that several …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3823Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction

Similar Documents

Publication Publication Date Title
Bera et al. Designing blockchain-based access control protocol in IoT-enabled smart-grid system
AU2021206913B2 (en) Systems and methods for distributed data sharing with asynchronous third-party attestation
Lux et al. Distributed-ledger-based authentication with decentralized identifiers and verifiable credentials
Lim et al. Blockchain technology the identity management and authentication service disruptor: a survey
Malik et al. Federated identity management (FIM): Challenges and opportunities
Gupta et al. A formal proximity model for RBAC systems
Sharma et al. Advanced multi-factor user authentication scheme for E-governance applications in smart cities
Soler et al. A privacy-preserving key transmission protocol to distribute QRNG keys using zk-SNARKs
Paquin U-prove technology overview v1. 1
Al Hamadi et al. Verifying mutual authentication for the DLK protocol using ProVerif tool
Kumar Using automated model analysis for reasoning about security of web protocols
Veeningen et al. Formal privacy analysis of communication protocols for identity management
Kumagai et al. Distributed Public Key Certificate‐Issuing Infrastructure for Consortium Certificate Authority Using Distributed Ledger Technology
Albogami et al. Public key infrastructure traditional and modern implementation
Ren et al. BIA: A blockchain-based identity authorization mechanism
Liang et al. An efficient blockchain-based anonymous authentication and supervision system
Augusto et al. OFELIA–A secure mobile attribute aggregation infrastructure for user-centric identity management
Jin et al. An efficient blockchain-based authentication scheme with transferability
Rehman et al. Securing cloud storage by remote data integrity check with secured key generation
Li et al. Publicly Traceable Attribute‐Based Anonymous Authentication and Its Application to Voting
Rajamanickam et al. Insider Attack Prevention: LAPUP—Lightweight Authentication Protocol Using PUF
Al-Hamadi et al. A novel protocol for security of location based services in multi-agent systems
Kościelny et al. Cryptographic Protocols
Buccafurri et al. Allowing privacy-preserving fog computing with digital identity assurance in remote clinical services
CN114005190B (en) Face recognition method for class attendance system