-
1
-
-
0029543006
-
Efficient Network Authentication Protocols: Lower Bounds and Optimal Implementations
-
G. Li, "Efficient Network Authentication Protocols: Lower Bounds and Optimal Implementations," Distributed Computing, vol. 9, no. 3, pp. 131-145, 1995.
-
(1995)
Distributed Computing
, vol.9
, Issue.3
, pp. 131-145
-
-
Li, G.1
-
2
-
-
0002494222
-
A Nonce-Based Protocol for Multiple Authentications
-
A. Kehne, J. Schonwalder, and H. Langendorfer, "A Nonce-Based Protocol for Multiple Authentications," ACM Operating Systems Rev., vol. 26, no. 4, pp. 84-89, 1992.
-
(1992)
ACM Operating Systems Rev
, vol.26
, Issue.4
, pp. 84-89
-
-
Kehne, A.1
Schonwalder, J.2
Langendorfer, H.3
-
4
-
-
35048892094
-
Simple and Efficient Group Key Agreement Based on Factoring
-
J. Nam, S. Cho, S. Kim, and D. Won, "Simple and Efficient Group Key Agreement Based on Factoring," Proc. Int'l Conf. Computational Science and Its Applications (ICCSA '04), pp. 645-654, 2004.
-
(2004)
Proc. Int'l Conf. Computational Science and Its Applications (ICCSA '04)
, pp. 645-654
-
-
Nam, J.1
Cho, S.2
Kim, S.3
Won, D.4
-
5
-
-
21644467750
-
A Provably Secure Three-Party Password-Based Authenticated Key Exchange Protocol Using Weil Pairing
-
H.A. Wen, T.F. Lee, and T. Hwang, "A Provably Secure Three-Party Password-Based Authenticated Key Exchange Protocol Using Weil Pairing," IEE Proc. Comm., vol. 152, no. 2, pp. 138-143, 2005.
-
(2005)
IEE Proc. Comm
, vol.152
, Issue.2
, pp. 138-143
-
-
Wen, H.A.1
Lee, T.F.2
Hwang, T.3
-
6
-
-
1642330512
-
The Evolution of the Kerberos Authentication Service
-
J.T. Kohl, "The Evolution of the Kerberos Authentication Service," EurOpen Conf. Proc., pp. 295-313, 1991.
-
(1991)
EurOpen Conf. Proc
, pp. 295-313
-
-
Kohl, J.T.1
-
7
-
-
0028514601
-
Kerberos: An Authentication Service for Computer Networks
-
B. Neuman and T. Ts'o, "Kerberos: An Authentication Service for Computer Networks," IEEE Comm., vol. 32, no. 9, pp. 33-38, 1994.
-
(1994)
IEEE Comm
, vol.32
, Issue.9
, pp. 33-38
-
-
Neuman, B.1
Ts'o, T.2
-
11
-
-
0003259517
-
Quantum Cryptography: Public Key Distribution and Coin Tossing
-
C.H. Bennett and G. Brassard, "Quantum Cryptography: Public Key Distribution and Coin Tossing," Proc. IEEE Int'l Conf. Computers, Systems, and Signal Processing, pp. 175-179, 1984.
-
(1984)
Proc. IEEE Int'l Conf. Computers, Systems, and Signal Processing
, pp. 175-179
-
-
Bennett, C.H.1
Brassard, G.2
-
12
-
-
11944254075
-
Quantum Cryptography Using any Two Nonorthogonal States
-
C.H. Bennett, "Quantum Cryptography Using any Two Nonorthogonal States," Physical Rev. Letters, vol. 68, no. 3121, 1992.
-
(1992)
Physical Rev. Letters
, vol.68
, Issue.3121
-
-
Bennett, C.H.1
-
13
-
-
0343152990
-
Quantum Cryptography Based on Bell's Theorem
-
A.K. Ekert, "Quantum Cryptography Based on Bell's Theorem," Physical Rev. Letters, vol. 67, no. 661, 1991.
-
(1991)
Physical Rev. Letters
, vol.67
, Issue.661
-
-
Ekert, A.K.1
-
14
-
-
0041782433
-
Quantum Cryptography without Public Announcement of Bases
-
W.Y. Hwang, I.G. Koh, and Y.D. Han, "Quantum Cryptography without Public Announcement of Bases," Physics Letters A, vol. 244, pp. 489-494, 1998.
-
(1998)
Physics Letters A
, vol.244
, pp. 489-494
-
-
Hwang, W.Y.1
Koh, I.G.2
Han, Y.D.3
-
15
-
-
0006375145
-
Identity Verification in Quantum Key Distribution
-
G. Zeng and W. Zhang, "Identity Verification in Quantum Key Distribution," Physical Rev. A, vol. 61, 2000.
-
(2000)
Physical Rev. A
, vol.61
-
-
Zeng, G.1
Zhang, W.2
-
16
-
-
84955621476
-
Quantum Key Distribution and String Oblivious Transfer in Noisy Channel
-
D. Mayers, "Quantum Key Distribution and String Oblivious Transfer in Noisy Channel," Proc. Advances in Cryptology (CRYPTO '96), pp. 343-357, 1996.
-
(1996)
Proc. Advances in Cryptology (CRYPTO '96)
, pp. 343-357
-
-
Mayers, D.1
-
17
-
-
0037319628
-
Proof of Security of Quantum Key Distribution with Two-Way Classical Communications
-
D. Gottesman and H.-K. Lo, "Proof of Security of Quantum Key Distribution with Two-Way Classical Communications," IEEE Trans. Information Theory, vol. 49, p. 457, 2003.
-
(2003)
IEEE Trans. Information Theory
, vol.49
, pp. 457
-
-
Gottesman, D.1
Lo, H.-K.2
-
18
-
-
0026626314
-
Experimental Quantum Cryptography
-
C. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, "Experimental Quantum Cryptography," J. Cryptology, vol. 5, pp. 3-28, 1992.
-
(1992)
J. Cryptology
, vol.5
, pp. 3-28
-
-
Bennett, C.1
Bessette, F.2
Brassard, G.3
Salvail, L.4
Smolin, J.5
-
19
-
-
0028428439
-
Secure Key Distribution System Based on Quantum Cryptography
-
P.D. Townsend, "Secure Key Distribution System Based on Quantum Cryptography," Electronics Letters, vol. 30, pp. 809-811, 1994.
-
(1994)
Electronics Letters
, vol.30
, pp. 809-811
-
-
Townsend, P.D.1
-
20
-
-
84955610252
-
Quantum Cryptography over Underground Optical Fibers
-
R.J. Hughes, G.G. Luther, G.L. Morgan, C.G. Peterson, and C. Simmons, "Quantum Cryptography over Underground Optical Fibers," Proc. Advances in Cryptology (CRYPTO '96), pp. 329-342, 1996.
-
(1996)
Proc. Advances in Cryptology (CRYPTO '96)
, pp. 329-342
-
-
Hughes, R.J.1
Luther, G.G.2
Morgan, G.L.3
Peterson, C.G.4
Simmons, C.5
-
21
-
-
0036013605
-
Quantum Cryptography
-
N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, "Quantum Cryptography," Rev. of Modern Physics, vol. 74, pp. 145-190, 2002.
-
(2002)
Rev. of Modern Physics
, vol.74
, pp. 145-190
-
-
Gisin, N.1
Ribordy, G.2
Tittel, W.3
Zbinden, H.4
-
22
-
-
33947385649
-
Can Quantum-Mechanical Description of Physical Reality Be Considered Complete?
-
A. Einstein, P. Podolsky, and S. Rosen, "Can Quantum-Mechanical Description of Physical Reality Be Considered Complete?" Physical Rev., vol. 47, pp. 777-780, 1935.
-
(1935)
Physical Rev
, vol.47
, pp. 777-780
-
-
Einstein, A.1
Podolsky, P.2
Rosen, S.3
-
23
-
-
0035751060
-
Provably Authenticated Group Diffie-Hellman Key Exchange
-
E. Bresson, O. Chevassut, D. Pointcheval, and J.-J. Quisquater, "Provably Authenticated Group Diffie-Hellman Key Exchange," Proc. Eighth ACM Conf. Computer and Comm. Security, pp. 255-264, 2001.
-
(2001)
Proc. Eighth ACM Conf. Computer and Comm. Security
, pp. 255-264
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
Quisquater, J.-J.4
-
24
-
-
33746708860
-
A Single Quantum Cannot Be Cloned
-
W.K. Wootters and W.H. Zurek, "A Single Quantum Cannot Be Cloned," Nature, vol. 299, pp. 802-803, 1992.
-
(1992)
Nature
, vol.299
, pp. 802-803
-
-
Wootters, W.K.1
Zurek, W.H.2
-
26
-
-
33644748254
-
Provably Secure Authenticated Key Exchange Protocols for Low Power Computing Clients
-
H.-A. Wen, C.-L. Lin, and T. Hwang, "Provably Secure Authenticated Key Exchange Protocols for Low Power Computing Clients," Computers and Security, vol. 25, pp. 106-113, 2006.
-
(2006)
Computers and Security
, vol.25
, pp. 106-113
-
-
Wen, H.-A.1
Lin, C.-L.2
Hwang, T.3
|