STOC '98 Proceedings of the thirtieth annual ACM symposium on Theory of computing
A security architecture for the Internet protocol
IBM Systems Journal
Public-key cryptography and password protocols
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Public-key cryptography and password protocols
ACM Transactions on Information and System Security (TISSEC)
Mobile values, new names, and secure communication
POPL '01 Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Analyzing security protocols with secrecy types and logic programs
POPL '02 Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Group security association (GSA) management in IP multicast
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Efficient, DoS-resistant, secure key exchange for internet protocols
Proceedings of the 9th ACM conference on Computer and communications security
Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
A Fast Authentication Method for Secure and Seamless Handoff
ICOIN '02 Revised Papers from the International Conference on Information Networking, Wireless Communications Technologies and Network Applications-Part II
Security Analysis of IKE's Signature-Based Key-Exchange Protocol
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
From Secrecy to Authenticity in Security Protocols
SAS '02 Proceedings of the 9th International Symposium on Static Analysis
Key-Privacy in Public-Key Encryption
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Abstracting Cryptographic Protocols by Prolog Rules
SAS '01 Proceedings of the 8th International Symposium on Static Analysis
Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols
Revised Papers from the 9th International Workshop on Security Protocols
An Efficient Cryptographic Protocol Verifier Based on Prolog Rules
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Receiver anonymity via incomparable public keys
Proceedings of the 10th ACM conference on Computer and communications security
Just fast keying: Key agreement in a hostile internet
ACM Transactions on Information and System Security (TISSEC)
An architecture for the internet key exchange protocol
IBM Systems Journal - End-to-end security
Off-the-record communication, or, why not to use PGP
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
IEEE Internet Computing
Theoretical Computer Science - Special issue: Foundations of wide area network computing
Analyzing security protocols with secrecy types and logic programs
Journal of the ACM (JACM)
New approaches for deniable authentication
Proceedings of the 12th ACM conference on Computer and communications security
Secure off-the-record messaging
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
Computer-assisted verification of a protocol for certified email
Science of Computer Programming - Special issue: Static analysis symposium (SAS 2003)
Deniable authentication and key exchange
Proceedings of the 13th ACM conference on Computer and communications security
An application of the context transfer protocol: IPsec in a IPv6 mobility environment
International Journal of Communication Networks and Distributed Systems
Application of IKE protocol for IPsec VPN into embedded system
ICCOM'05 Proceedings of the 9th WSEAS International Conference on Communications
Deniable Authentication on the Internet
Information Security and Cryptology
Efficient One-Round Key Exchange in the Standard Model
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
An Efficient Deniable Key Exchange Protocol (Extended Abstract)
Financial Cryptography and Data Security
One-round key exchange in the standard model
International Journal of Applied Cryptography
Automatic verification of correspondences for security protocols
Journal of Computer Security
Multi-party off-the-record messaging
Proceedings of the 16th ACM conference on Computer and communications security
A Formalization of Credit and Responsibility Within the GNDC Schema
Electronic Notes in Theoretical Computer Science (ENTCS)
Computer-assisted verification of a protocol for certified email
SAS'03 Proceedings of the 10th international conference on Static analysis
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Hiding names: private authentication in the applied pi calculus
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Environmental requirements for authentication protocols
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Chameleon-based deniable authenticated key agreement protocol secure against forgery
OCSC'07 Proceedings of the 2nd international conference on Online communities and social computing
Finite models for formal security proofs
Journal of Computer Security - 7th International Workshop on Issues in the Theory of Security (WITS'07)
Okamoto-Tanaka revisited: fully authenticated diffie-hellman with minimal overhead
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
Errors in computational complexity proofs for protocols
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
On the security of the canetti-krawczyk model
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
The sampling twice technique for the RSA-Based cryptosystems with anonymity
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
An efficient key tree management algorithm for LKH group key management
ICOIN'06 Proceedings of the 2006 international conference on Information Networking: advances in Data Communications and Wireless Networks
HMQV: a high-performance secure diffie-hellman protocol
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Browser model for security analysis of browser-based protocols
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Key exchange using passwords and long keys
TCC'06 Proceedings of the Third conference on Theory of Cryptography
Intrusion-Resilience via the bounded-storage model
TCC'06 Proceedings of the Third conference on Theory of Cryptography
Authenticated key exchange under bad randomness
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
Timed encryption with application to deniable key exchange
TAMC'12 Proceedings of the 9th Annual international conference on Theory and Applications of Models of Computation
Hi-index | 0.00 |
A secure and versatile key exchange protocol for key management over Internet is presented. SKEME constitutes a compact protocol that supports a variety of realistic scenarios and security models over Internet. It provides clear tradeoffs between security and performance as required by the different scenarios without incurring in unnecessary system complexity. The protocol supports key exchange based on public key, key distribution centers, or manual installation, and provides for fast and secure key refreshment. In addition, SKEME selectively provides perfect forward secrecy, allows for replaceability and negotiation of the underlying cryptographic primitives, and addresses privacy issues as anonymity and repudiatability.