Academic literature on the topic 'No Key-Exchange'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'No Key-Exchange.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "No Key-Exchange"

1

Jeong, Ik, and Dong Lee. "Parallel Key Exchange." JUCS - Journal of Universal Computer Science 14, no. (3) (2008): 377–96. https://doi.org/10.3217/jucs-014-03-0377.

Full text
Abstract:
In the paper we study parallel key exchange among multiple parties. The status of parallel key exchange can be depicted by a key graph. In a key graph, a vertex represents a party and an edge represents a relation of two parties who are to share a key. We first propose a security model for a key graph, which extends the Bellare-Rogaway model for two-party key exchange. Next, we clarify the relations among the various security notions of key exchange. Finally, we construct an efficient key exchange protocol for a key graph using the randomness re-use technique. Our protocol establishes the mult
APA, Harvard, Vancouver, ISO, and other styles
2

Issa, Mohaned, and Adil Alramahi. "Using Diffie-Hellman Key - Exchange in RADG." International Journal of Scientific Engineering and Research 6, no. 9 (2018): 56–58. https://doi.org/10.70729/ijser18168.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Saraswathi, K., B. Jayaram, and R. Balasubramanian. "Iris Biometrics Based Authentication and Key Exchange System." International Journal of Engineering and Technology 3, no. 1 (2011): 102–8. http://dx.doi.org/10.7763/ijet.2011.v3.207.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Moreau, T. "Probabilistic encryption key exchange." Electronics Letters 31, no. 25 (1995): 2166–68. http://dx.doi.org/10.1049/el:19951499.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

González Vasco, Maria Isabel, Angel Luis Pérez del Pozo, and Adriana Suárez Corona. "Group key exchange protocols withstanding ephemeral-key reveals." IET Information Security 12, no. 1 (2018): 79–86. http://dx.doi.org/10.1049/iet-ifs.2017.0131.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lee, Yung-Cheng, and Chi-Sung Laih. "On the key escrow system without key exchange." Computers & Electrical Engineering 25, no. 4 (1999): 279–90. http://dx.doi.org/10.1016/s0045-7906(99)00013-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Alvarez, Rafael, Cándido Caballero-Gil, Juan Santonja, and Antonio Zamora. "Algorithms for Lightweight Key Exchange †." Sensors 17, no. 7 (2017): 1517. http://dx.doi.org/10.3390/s17071517.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Meshram, A. J., C. Meshram, S. D. Bagde, and R. R. Meshram. "RIPIC BASED KEY EXCHANGE PROTOCOL." Advances in Mathematics: Scientific Journal 9, no. 12 (2020): 11169–77. http://dx.doi.org/10.37418/amsj.9.12.97.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lin, Chun-Li, Hung-Min Sun, and Tzonelih Hwang. "Three-party encrypted key exchange." ACM SIGOPS Operating Systems Review 34, no. 4 (2000): 12–20. http://dx.doi.org/10.1145/506106.506108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zhang, Yuexin, Yang Xiang, and Xinyi Huang. "Password-Authenticated Group Key Exchange." ACM Transactions on Internet Technology 16, no. 4 (2016): 1–20. http://dx.doi.org/10.1145/2955095.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "No Key-Exchange"

1

Kurt, Yesem. "New key exchange primitives." [Bloomington, Ind.] : Indiana University, 2006. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3243768.

Full text
Abstract:
Thesis (Ph.D.)--Indiana University, Dept. of Mathematics, 2006.<br>Title from PDF t.p. (viewed Nov. 18, 2008). Source: Dissertation Abstracts International, Volume: 67-12, Section: B, page: 7117. Adviser: Jee-Heub Koh.
APA, Harvard, Vancouver, ISO, and other styles
2

Manulis, Mark. "Provably secure group key exchange." Berlin Bochum Dülmen London Paris Europ. Univ.-Verl, 2007. http://deposit.d-nb.de/cgi-bin/dokserv?id=2993029&prov=M&dok_var=1&dok_ext=htm.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Soltwisch, Rene Alexander. "The Inter-Domain Key Exchange Protocol." Doctoral thesis, [S.l.] : [s.n.], 2006. http://hdl.handle.net/11858/00-1735-0000-0006-B403-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Uslu, Sevgi Koltuksuz Ahmet. "Basic Key Exchange Protocols For Secret Key Cryptosystems Under Crympix Library/." [s.l.]: [s.n.], 2007. http://library.iyte.edu.tr/tezler/master/bilgisayaryazilimi/T000618.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Williams, Stephen C. "On the security of key exchange protocols." Thesis, University of Bristol, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.556744.

Full text
Abstract:
This thesis is primarily concerned with the security of key exchange protocols. Specifically, we consider composability properties for such protocols within the tradi- tional game-based framework. Our composition results are distinguished from virtually all existing work as we do not rely, neither directly nor indirectly, on the simulation paradigm. In addition we provide a formal analysis of the widely deployed SSH pro- tocol's key exchange mechanism. As a first step, we show composability properties for key exchange protocols secure in the prevalent model of Bellare and Rogaway. Roughly spea
APA, Harvard, Vancouver, ISO, and other styles
6

Garratt, Luke. "Realistic, strong and provable key exchange security." Thesis, University of Oxford, 2018. http://ora.ox.ac.uk/objects/uuid:389973d5-9c96-4905-b412-2514578abf20.

Full text
Abstract:
Authenticated key exchange protocols are ubiquitous in modern-day life. They are used to secure numerous types of data exchange, ranging from online banking to instant messaging conversations. In this thesis, we extend the state of the art for authenticated key exchange security, following the three themes of realistic, strong and provable. First, we tackle the theme of provable security. We develop generic techniques, applicable to a wide range of security models, to assist in proofs of security of cryptographic schemes. Specifically, a "game hopping" proof is a powerful technique to prove st
APA, Harvard, Vancouver, ISO, and other styles
7

Shah, Illana. "Quantum key exchange and mutually unbiased bases." Thesis, Royal Holloway, University of London, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.497647.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zhang, J. "Authenticated key exchange protocols with unbalanced computational requirements." Thesis, University of Liverpool, 2018. http://livrepository.liverpool.ac.uk/3025159/.

Full text
Abstract:
Security is a significant problem for communications in many scenarios in Internet of Things (IoT), such as military applications, electronic payment, wireless reprogramming of smart devices and so on. To protect communications, a secret key shared by the communicating parties is often required. Authenticated key exchange (AKE) is one of the most widely used methods to provide two or more parties communicating over an open network with a shared secret key. It has been studied for many years. A large number of protocols are available by now. The majority of existing AKE protocols require the tw
APA, Harvard, Vancouver, ISO, and other styles
9

Snook, Michael. "Quantum Resistant Authenticated Key Exchange from Ideal Lattices." University of Cincinnati / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1470757378.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Al-Ismaily, Nasser. "Dynamic block encryption with self-authenticating key exchange." Thesis, Loughborough University, 2005. https://dspace.lboro.ac.uk/2134/7825.

Full text
Abstract:
One of the greatest challenges facing cryptographers is the mechanism used for key exchange. When secret data is transmitted, the chances are that there may be an attacker who will try to intercept and decrypt the message. Having done so, he/she might just gain advantage over the information obtained, or attempt to tamper with the message, and thus, misguiding the recipient. Both cases are equally fatal and may cause great harm as a consequence. In cryptography, there are two commonly used methods of exchanging secret keys between parties. In the first method, symmetric cryptography, the key i
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "No Key-Exchange"

1

Mattione, Richard P. The impact of exchange rate changes in key currencies on trade. South East Asian Central Banks, Research and Training Centre, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Argy, Victor E. Choice of exchange rate regime for a smaller economy: A survey of some key issues. Macquarie University, School of Economic & Financial Studies, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Edwards, Melvin D. NAWDEX: A key to finding water data. U.S. Dept. of the Interior, Geological Survey, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Reisen, Helmut. Key prices for adjustment towards less external indebtedness. Development Centre of the Organisation for Economic Co-operation and Development, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ahmed, Sadiq. How Indonesia's monetary policy affects key variables. Asia Regional Office, Country Dept. V, World Bank, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Renton, N. E. Understanding the Australian economic debate: A lucid and opinionated primer to the key economic issues facing Australia in the 1990's. Including explanation and commentary on tax, wages, interest rates, housing, social securities, inflation, exchange rates, privatisation etc. Australian Investment Library, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Frost. Elliott wave principle: Key to stock market profits. McGraw-Hill, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Atkin, John. Economic and monetary union: Key implications for your business. Thorogood, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Krämer, Sybille. Medium, Messenger, Transmission. Amsterdam University Press, 2016. http://dx.doi.org/10.5117/9789462983083.

Full text
Abstract:
This rich study provides a comprehensive introduction to media philosophy while offering a new perspective on the concept and function of transmission media in all systems of exchange. Krämer uses the figure of the messenger as a key metaphor, examining a diverse range of transmission events, including the circulation of money, translation of languages, angelic visitations, spread of infectious diseases, and processes of transference and counter-transference that occur during psychoanalysis.
APA, Harvard, Vancouver, ISO, and other styles
10

Cappellini, Vito, ed. Electronic Imaging & the Visual Arts. EVA 2012 Florence. Firenze University Press, 2012. http://dx.doi.org/10.36253/978-88-6655-130-0.

Full text
Abstract:
The key aim of this Event is to provide a forum for the user, supplier and scientific research communities to meet and exchange experiences, ideas and plans in the wide area of Culture &amp; Technology. Participants receive up to date news on new EC and international arts computing &amp; telecommunications initiatives as well as on Projects in the visual arts field, in archaeology and history. Working Groups and new Projects are promoted. Scientific and technical demonstrations are presented.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "No Key-Exchange"

1

Weik, Martin H. "key-exchange key." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_9794.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Weik, Martin H. "exchange key." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_6494.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Buchanan, William J. "Key Exchange." In Cryptography. River Publishers, 2022. http://dx.doi.org/10.1201/9781003337751-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gjøsteen, Kristian. "Key Exchange." In Practical Mathematical Cryptography. Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9781003149422-10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Schneier, Bruce. "Key-Exchange Algorithms." In Applied Cryptography, Second Edition. John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781119183471.ch22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Freire, Eduarda S. V., Dennis Hofheinz, Eike Kiltz, and Kenneth G. Paterson. "Non-Interactive Key Exchange." In Public-Key Cryptography – PKC 2013. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36362-7_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dodis, Yevgeniy, and Dario Fiore. "Unilaterally-Authenticated Key Exchange." In Financial Cryptography and Data Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70972-7_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mizuki, Takaaki, Hiroki Shizuya, and Takao Nishizeki. "Eulerian Secret Key Exchange." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/3-540-68535-9_39.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Yao, Andrew C., and Yunlei Zhao. "Deniable Internet Key Exchange." In Applied Cryptography and Network Security. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13708-2_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Birkett, James, and Douglas Stebila. "Predicate-Based Key Exchange." In Information Security and Privacy. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14081-5_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "No Key-Exchange"

1

Sarojam Chellam, Manjith Baby, Ramasubramanian Natarajan, and Nagi Naganathan. "Secure key exchange protocol and storage of logic locking key." In 2024 28th International Symposium on VLSI Design and Test (VDAT). IEEE, 2024. http://dx.doi.org/10.1109/vdat63601.2024.10705695.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Arjun, Anapalli, Sandhiya A, and SK Uma Maheswaran. "Idle Key Distribution Protocol for Efficient Quantum Key Exchange in Dynamic Networks." In 2025 International Conference on Computing and Communication Technologies (ICCCT). IEEE, 2025. https://doi.org/10.1109/iccct63501.2025.11019788.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gupta, Siddharth, Sahithya Kodam, and Baijian Yang. "Multichannel key exchange." In ICC '17: Second International Conference on Internet of Things, Data and Cloud Computing. ACM, 2017. http://dx.doi.org/10.1145/3018896.3025145.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Günther, Felix, Douglas Stebila, and Shannon Veitch. "Obfuscated Key Exchange." In CCS '24: ACM SIGSAC Conference on Computer and Communications Security. ACM, 2024. https://doi.org/10.1145/3658644.3690220.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bellovin, Steven M., and Michael Merritt. "Augmented encrypted key exchange." In the 1st ACM conference. ACM Press, 1993. http://dx.doi.org/10.1145/168588.168618.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

SreeDeepika, M., N. Sri Lekhya, Likesh K, and Shinu M. Rajagopal. "Implementing Internet Key Exchange with Image-based Key Exchange through Socket Programming." In 2024 IEEE 9th International Conference for Convergence in Technology (I2CT). IEEE, 2024. http://dx.doi.org/10.1109/i2ct61223.2024.10544262.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Yi, Tong, Minyong Shi, and Wenqian Shang. "Key exchange protocol based on the private key." In 2015 International Conference on Automation, Mechanical Control and Computational Engineering. Atlantis Press, 2015. http://dx.doi.org/10.2991/amcce-15.2015.6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kobara, Kazukuni, Seonghan Shin, and Mario Strefler. "Partnership in key exchange protocols." In the 4th International Symposium. ACM Press, 2009. http://dx.doi.org/10.1145/1533057.1533081.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Portnoi, Marcos, and Chien-Chung Shen. "Location-enhanced authenticated key exchange." In 2016 International Conference on Computing, Networking and Communications (ICNC). IEEE, 2016. http://dx.doi.org/10.1109/iccnc.2016.7440584.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Costea, Sergiu, Marios O. Choudary, Doru Gucea, Björn Tackmann, and Costin Raiciu. "Secure Opportunistic Multipath Key Exchange." In CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2018. http://dx.doi.org/10.1145/3243734.3243791.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "No Key-Exchange"

1

Harkins, D., ed. Dragonfly Key Exchange. RFC Editor, 2015. http://dx.doi.org/10.17487/rfc7664.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Harkins, D., and D. Carrel. The Internet Key Exchange (IKE). RFC Editor, 1998. http://dx.doi.org/10.17487/rfc2409.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kaufman, C., ed. Internet Key Exchange (IKEv2) Protocol. RFC Editor, 2005. http://dx.doi.org/10.17487/rfc4306.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cakulev, V., G. Sundaram, and I. Broustis. IBAKE: Identity-Based Authenticated Key Exchange. RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6539.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Toliver, Paul. SeaQuaKE: Sea-optimized Quantum Key Exchange. Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada605824.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Toliver, Paul. SeaQuaKE: Sea-Optimized Quantum Key Exchange. Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada608175.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Toliver, Paul. SeaQuaKE: Sea-optimized Quantum Key Exchange. Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada614471.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ladd, W. SPAKE2, a Password-Authenticated Key Exchange. RFC Editor, 2023. http://dx.doi.org/10.17487/rfc9382.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Atkinson, R. Key Exchange Delegation Record for the DNS. RFC Editor, 1997. http://dx.doi.org/10.17487/rfc2230.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wu, T. The SRP Authentication and Key Exchange System. RFC Editor, 2000. http://dx.doi.org/10.17487/rfc2945.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!