Public Key Encryption Techniques Provide Extreme Secure Chat Environment
暂无分享,去创建一个
[1] Antoine Joux,et al. Fault Attacks on RSA Signatures with Partially Unknown Messages , 2009, CHES.
[2] Michael Backes,et al. Cryptographically sound security proofs for basic and public-key Kerberos , 2006, International Journal of Information Security.
[3] V. Vaidehi,et al. VLSI Design and Implementation of Combined Secure Hash Algorithm SHA-512 , 2010, CNSA.
[4] Emmanuel Bresson,et al. Password-Based Group Key Exchange in a Constant Number of Rounds , 2006, Public Key Cryptography.
[5] Lixia Zhang,et al. Implementing instant messaging using named data , 2010, AINTEC.
[6] Maheswara Rao Valluri,et al. Authentication Schemes Using Polynomials Over Non-Commutative Rings , 2013, ArXiv.
[7] D. Goldfeld,et al. An algebraic method for public-key cryptography , 1999 .
[8] Hung-Min Sun,et al. SPATE: Small-Group PKI-Less Authenticated Trust Establishment , 2010, IEEE Transactions on Mobile Computing.
[9] G. Anjaneyulu,et al. Secured Directed Digital Signature over Non-Commutative Division Semirings and Allocation of Experimental Registration Number , 2012 .
[10] Constantinos Patsakis,et al. Number Theoretic SETUPs for RSA Like Factoring Based Algorithms , 2012, J. Inf. Hiding Multim. Signal Process..
[11] Mohd Kamir Yusof,et al. A Secure and Reliable Chat Room Application via Embedded Chaotic Encryption , 2012, Smart Comput. Rev..
[12] Claude Crépeau,et al. Simple Backdoors for RSA Key Generation , 2003, CT-RSA.
[13] Mohd Kamir Yusof,et al. Designing a Secure Architecture for Private Instant Messenger Application , 2011 .
[14] Birgit Pfitzmann,et al. Relating symbolic and cryptographic secrecy , 2005, IEEE Transactions on Dependable and Secure Computing.
[15] Bo-Yin Yang,et al. GAnGS: gather, authenticate 'n group securely , 2008, MobiCom '08.
[16] Jung Hee Cheon,et al. New Public-Key Cryptosystem Using Braid Groups , 2000, CRYPTO.
[17] Khaled Elleithy,et al. COMBINING PRIVATE AND PUBLIC KEY ENCRYPTION TECHNIQUES FOR PROVIDING EXTREME SECURE ENVIRONMENT FOR AN ACADEMIC INSTITUTION APPLICATION , 2010 .
[18] David Snogles. PERSONAL ENCRYPTED TALK - SECURING INSTANT MESSAGING WITH A JAVA APPLICATION , 2005 .
[19] John C. Mitchell,et al. Key Exchange Protocols: Security Definition, Proof Method and Applications , 2006, IACR Cryptol. ePrint Arch..
[20] Manoj Kumar,et al. Rectified Differential Cryptanalysis of 16 Round Present , 2012 .
[21] Michael D. Smith,et al. Implementing public-key infrastructure for sensor networks , 2008, TOSN.