DC Field | Value | Language |
---|---|---|
dc.contributor.author | LIM, CH | - |
dc.contributor.author | LEE, PJ | - |
dc.date.accessioned | 2016-03-31T14:33:26Z | - |
dc.date.available | 2016-03-31T14:33:26Z | - |
dc.date.created | 2009-03-20 | - |
dc.date.issued | 1995-01-27 | - |
dc.identifier.issn | 0020-0190 | - |
dc.identifier.other | 1995-OAK-0000009036 | - |
dc.identifier.uri | https://oasis.postech.ac.kr/handle/2014.oak/21857 | - |
dc.description.abstract | It is often desirable to achieve mutual authentication and secret key exchange in the same protocol. Two kinds of approaches may be considered for this purpose: authentication after key exchange using symmetric algorithms and Diffie-Hellman-type key exchange protocols, and key exchange after authentication by modifying 3-move identification schemes based on zero-knowledge technique. This letter presents several such protocols by each approach. | - |
dc.description.statementofresponsibility | X | - |
dc.language | English | - |
dc.publisher | ELSEVIER SCIENCE BV | - |
dc.relation.isPartOf | INFORMATION PROCESSING LETTERS | - |
dc.subject | ALGORITHMS | - |
dc.subject | CRYPTOGRAPHY | - |
dc.subject | AUTHENTICATION | - |
dc.subject | KEY EXCHANGE | - |
dc.title | SEVERAL PRACTICAL PROTOCOLS FOR AUTHENTICATION AND KEY EXCHANGE | - |
dc.type | Article | - |
dc.contributor.college | 전자전기공학과 | - |
dc.identifier.doi | 10.1016/0020-0190(94)00178-2 | - |
dc.author.google | LIM, CH | - |
dc.author.google | LEE, PJ | - |
dc.relation.volume | 53 | - |
dc.relation.issue | 2 | - |
dc.relation.startpage | 91 | - |
dc.relation.lastpage | 96 | - |
dc.contributor.id | 10051689 | - |
dc.relation.journal | INFORMATION PROCESSING LETTERS | - |
dc.relation.index | SCI급, SCOPUS 등재논문 | - |
dc.relation.sci | SCIE | - |
dc.collections.name | Journal Papers | - |
dc.type.rims | ART | - |
dc.identifier.bibliographicCitation | INFORMATION PROCESSING LETTERS, v.53, no.2, pp.91 - 96 | - |
dc.identifier.wosid | A1995QD06800005 | - |
dc.date.tcdate | 2019-01-01 | - |
dc.citation.endPage | 96 | - |
dc.citation.number | 2 | - |
dc.citation.startPage | 91 | - |
dc.citation.title | INFORMATION PROCESSING LETTERS | - |
dc.citation.volume | 53 | - |
dc.contributor.affiliatedAuthor | LEE, PJ | - |
dc.identifier.scopusid | 2-s2.0-0029208641 | - |
dc.description.journalClass | 1 | - |
dc.description.journalClass | 1 | - |
dc.description.wostc | 8 | - |
dc.type.docType | Article | - |
dc.subject.keywordAuthor | ALGORITHMS | - |
dc.subject.keywordAuthor | CRYPTOGRAPHY | - |
dc.subject.keywordAuthor | AUTHENTICATION | - |
dc.subject.keywordAuthor | KEY EXCHANGE | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
library@postech.ac.kr Tel: 054-279-2548
Copyrights © by 2017 Pohang University of Science ad Technology All right reserved.