KEY MANAGEMENT SCHEME FOR END-TO-END ENCRYPTION AND A FORMAL VERIFICATION OF ITS SECURITY.

被引:0
|
作者
Kasami, Tadao
Yamamura, Saburo
Mori, Kenichi
机构
来源
Systems, computers, controls | 1982年 / 13卷 / 03期
关键词
Compendex;
D O I
暂无
中图分类号
学科分类号
摘要
4
引用
收藏
页码:59 / 69
相关论文
共 50 条
  • [21] A Formal Security Analysis of the p ≡ p Authentication Protocol for Decentralized Key Distribution and End-to-End Encrypted Email
    Sandoval, Itzel Vazquez
    Lenzini, Gabriele
    EMERGING TECHNOLOGIES FOR AUTHORIZATION AND AUTHENTICATION, ETAA 2019, 2020, 11967 : 171 - 187
  • [22] An End-to-End Security Approach for Digital Document Management
    Diego Munoz-Hernandez, Mario
    Morales-Sandoval, Miguel
    Juan Garcia-Hernandez, Jose
    COMPUTER JOURNAL, 2016, 59 (07): : 1076 - 1090
  • [23] Type-preserving Compilation for End-to-end Verification of Security Enforcement
    Chen, Juan
    Chugh, Ravi
    Swamy, Nikhil
    ACM SIGPLAN NOTICES, 2010, 45 (06) : 412 - 423
  • [24] Type-preserving Compilation for End-to-end Verification of Security Enforcement
    Chen, Juan
    Chugh, Ravi
    Swamy, Nikhil
    PLDI '10: PROCEEDINGS OF THE 2010 ACM SIGPLAN CONFERENCE ON PROGRAMMING LANGUAGE DESIGN AND IMPLEMENTATION, 2010, : 412 - 423
  • [25] EEE-GSM: End-to-End Encryption Scheme over GSM System
    Ramadan, Mohammed
    Du, Guohong
    Li, Fagen
    Xu, Chun Xiang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (06): : 229 - 239
  • [26] Secret Key Recovery in a Global-Scale End-to-End Encryption System
    Connell, Graeme
    Fang, Vivian
    Schmidt, Rolfe
    Dauterman, Emma
    Popa, Raluca Ada
    PROCEEDINGS OF THE 18TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, OSDI 2024, 2024, : 703 - 719
  • [27] JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT
    Kumar, Sam
    Hu, Yuncong
    Andersen, Michael P.
    Popa, Raluca Ada
    Culler, David E.
    PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, 2019, : 1519 - 1536
  • [28] Research on end-to-end encryption of TETRA
    Beijing FORICH Software Technology Co. Ltd., Network Security Division, Beijing 100083, China
    不详
    J. China Univ. Post Telecom., 2006, 2 (70-73):
  • [29] Research on End-to-End Encryption of TETRA
    ZHANG Zhi-hui 1
    2.Information Security Center
    The Journal of China Universities of Posts and Telecommunications, 2006, (02) : 70 - 73
  • [30] SDNS ARCHITECTURE AND END-TO-END ENCRYPTION
    NELSON, R
    HEIMANN, J
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 435 : 356 - 366