Now showing items 1-2 of 2

    • Modeling and detecting attacks against key agreement protocols 

      Yadav, Anshu (Dhirubhai Ambani Institute of Information and Communication Technology, 2012)
      Key agreement protocols establish a shared secret key between two or more communicating parties willing to exchange data over insecure channels using symmetric key cryptography. Based on the number of members involved ...
    • Technique to improve revocation mechanism and enhancement of CA's services 

      Thacker, Grishma D. (Dhirubhai Ambani Institute of Information and Communication Technology, 2004)
      Public Key Cryptography [PKC] is becoming popular in the world of security because of its promising features like authentication and non-repudiation along with integrity and data confidentiality. It has been possible to ...