Bani-Hani, 2006 - Google Patents
Enhancing the IKE preshared key authentication methodBani-Hani, 2006
View PDF- Document ID
- 13388933870099449054
- Author
- Bani-Hani R
- Publication year
External Links
- 230000002708 enhancing 0 title description 10
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9584495B2 (en) | Method and system for establishing secure communications using composite key cryptography | |
Satapathy et al. | A Comprehensive Survey on SSL/TLS and their Vulnerabilities | |
JP4833489B2 (en) | System, method and software for remote password authentication using multiple servers | |
US7424615B1 (en) | Mutually authenticated secure key exchange (MASKE) | |
US7979707B2 (en) | Secure seed generation protocol | |
US20020056040A1 (en) | System and method for establishing secure communication | |
US20120023336A1 (en) | System and method for designing secure client-server communication protocols based on certificateless public key infrastructure | |
Lounis et al. | Bad-token: denial of service attacks on WPA3 | |
JP2008250931A (en) | System for restoring distributed information, information utilizing device, and verification device | |
Kwon et al. | (In-) security of cookies in HTTPS: Cookie theft by removing cookie flags | |
US11917056B1 (en) | System and method of securing a server using elliptic curve cryptography | |
Miculan et al. | Automated Symbolic Verification of Telegram's MTProto 2.0 | |
TW200803392A (en) | Method, device, server arrangement, system and computer program products for securely storing data in a portable device | |
Momani et al. | Comparative analysis of Open-SSL vulnerabilities & heartbleed exploit detection | |
Bani-Hani | Enhancing the IKE preshared key authentication method | |
Limniotis et al. | Cryptography threats | |
EP4443927A1 (en) | Trusted measurement-integrated communication method and apparatus | |
Suvidha | Secure Authentication Schemes for Roaming Service in Global Mobility Networks | |
Chen et al. | SSL/TLS session-aware user authentication using a gaa bootstrapped key | |
Madhusudhan | Design of Robust Authentication Protocols for Roaming Service in Glomonet and Mitigation of XSS Attacks in Web Applications | |
EP3720165A1 (en) | Method for proving at least one of identity and entitlement | |
Roos | Lecture Notes: Computer Networks CSE1405 Cryptography and Network Security | |
Venugopal | The design, implementation, and evaluation of cryptographic distributed applications: Secure PVM | |
Bıçakcı | On the efficiency of authentication protocols, digital signatures and their applications in e-health: a top-down approach | |
CN115001705A (en) | Network protocol security improving method based on encryption equipment |