Browsing by Subject "Public key infrastructure"
Now showing items 1-2 of 2
-
Modeling and detecting attacks against key agreement protocols
(Dhirubhai Ambani Institute of Information and Communication Technology, 2012)Key agreement protocols establish a shared secret key between two or more communicating parties willing to exchange data over insecure channels using symmetric key cryptography. Based on the number of members involved ... -
Technique to improve revocation mechanism and enhancement of CA's services
(Dhirubhai Ambani Institute of Information and Communication Technology, 2004)Public Key Cryptography [PKC] is becoming popular in the world of security because of its promising features like authentication and non-repudiation along with integrity and data confidentiality. It has been possible to ...