Articles with "trusted third" as a keyword



Photo from wikipedia

A novel trusted third party based signcryption scheme

Sign Up to like & get
recommendations!
Published in 2020 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-020-09027-w

Abstract: To prevent man-in-the-middle attack, Diffie-Hellman first proposed the concept of the session key exchange protocol, in which the author remove the long term keying material at the end of the session. In our scheme, we… read more here.

Keywords: scheme; session key; trusted third; third party ... See more keywords