[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Bani-Hani, 2006 - Google Patents

Enhancing the IKE preshared key authentication method

Bani-Hani, 2006

View PDF
Document ID
13388933870099449054
Author
Bani-Hani R
Publication year

External Links

Continue reading at citeseerx.ist.psu.edu (PDF) (other versions)

Similar Documents

Publication Publication Date Title
US9584495B2 (en) Method and system for establishing secure communications using composite key cryptography
Satapathy et al. A Comprehensive Survey on SSL/TLS and their Vulnerabilities
JP4833489B2 (en) System, method and software for remote password authentication using multiple servers
US7424615B1 (en) Mutually authenticated secure key exchange (MASKE)
US7979707B2 (en) Secure seed generation protocol
US20020056040A1 (en) System and method for establishing secure communication
US20120023336A1 (en) System and method for designing secure client-server communication protocols based on certificateless public key infrastructure
Lounis et al. Bad-token: denial of service attacks on WPA3
JP2008250931A (en) System for restoring distributed information, information utilizing device, and verification device
Kwon et al. (In-) security of cookies in HTTPS: Cookie theft by removing cookie flags
US11917056B1 (en) System and method of securing a server using elliptic curve cryptography
Miculan et al. Automated Symbolic Verification of Telegram's MTProto 2.0
TW200803392A (en) Method, device, server arrangement, system and computer program products for securely storing data in a portable device
Momani et al. Comparative analysis of Open-SSL vulnerabilities & heartbleed exploit detection
Bani-Hani Enhancing the IKE preshared key authentication method
Limniotis et al. Cryptography threats
EP4443927A1 (en) Trusted measurement-integrated communication method and apparatus
Suvidha Secure Authentication Schemes for Roaming Service in Global Mobility Networks
Chen et al. SSL/TLS session-aware user authentication using a gaa bootstrapped key
Madhusudhan Design of Robust Authentication Protocols for Roaming Service in Glomonet and Mitigation of XSS Attacks in Web Applications
EP3720165A1 (en) Method for proving at least one of identity and entitlement
Roos Lecture Notes: Computer Networks CSE1405 Cryptography and Network Security
Venugopal The design, implementation, and evaluation of cryptographic distributed applications: Secure PVM
Bıçakcı On the efficiency of authentication protocols, digital signatures and their applications in e-health: a top-down approach
CN115001705A (en) Network protocol security improving method based on encryption equipment