[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Fumy, 1999 - Google Patents

Key management techniques

Fumy, 1999

View PDF
Document ID
15529302046471505474
Author
Fumy W
Publication year
Publication venue
State of the Art in Applied Cryptography: Course on Computer Security and Industrial Cryptography Leuven, Belgium, June 3–6, 1997 Revised Lectures

External Links

Snippet

Security services based on cryptographic mechanisms assume cryptographic keys to be available to the communicating parties prior to secure communications. Key management techniques depend on the underlying cryptographic techniques, the intended use of the …
Continue reading at dulieu.antoanthongtin.gov.vn (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Merkle Protocols for public key cryptosystems
Perlman The ephemerizer: Making data disappear
US6058188A (en) Method and apparatus for interoperable validation of key recovery information in a cryptographic system
US5907618A (en) Method and apparatus for verifiably providing key recovery information in a cryptographic system
CA2187035C (en) Computer network cryptographic key distribution system
US5796833A (en) Public key sterilization
JP4384728B2 (en) Key agreement and transport protocols using intrinsic signatures
JP3560439B2 (en) Device for performing encryption key recovery
Carlsen Optimal privacy and authentication on a portable communications system
US8687812B2 (en) Method and apparatus for public key cryptography
US20030012386A1 (en) Forward-secure commercial key escrow systems and escrowing methods thereof
US20030210789A1 (en) Data transmission links
JP2005515701A6 (en) Data transmission link
JP2005515715A (en) Data transmission link
US7971234B1 (en) Method and apparatus for offline cryptographic key establishment
CN118555133A (en) Quantum-resistant security enhancement method of transport layer security protocol
Prabhu et al. Security in computer networks and distributed systems
Fumy Key management techniques
Yeun Design, analysis and applications of cryptographic techniques
CN117749413B (en) Secure communication method and secure communication system based on TLCP (transport layer control protocol) business-to-business protocol
Witzke et al. Key management for large scale end-to-end encryption
US20240214187A1 (en) System and Method of Creating Symmetric Keys Using Elliptic Curve Cryptography
CN118540164B (en) Quantum security enhancement method for Internet key exchange protocol
Yeun et al. Secure software download for programmable mobile user equipment
Merkle 4. Protocols for