ThesaHelp: references i-l
Topic: key distribution
| |
Reference
Janson, P., Tsudik, G. ,
"Secure and minimal protocols for authenticated key distribution",
Computer Communications Journal, 18, 9 , September 1995, pp. 645-653.
Google
Other Reference
http://www.zurich.ibm.com/Technology/Security
Quotations
4 ;;Quote: a freshly generated key is like a nonce: randomly generated by one party for one-time, key distribution
| 11 ;;Quote: minimal, challenge-based protocol for key distribution between two parties
| 12 ;;Quote: three-party key distribution by braiding together two runs of two-party key distribution with a two-party authorization; distributed key can not be altered
|
Related Topics
ThesaHelp: references i-l (342 items)
Topic: key distribution (33 items)
|