1976
DOI: 10.1109/tit.1976.1055638
|View full text |Cite
|
Sign up to set email alerts
|

New directions in cryptography

Abstract: In Distributed environment authentication and keyexchange mechanisms plays a major role. Generally in authentication a client and server agree upon a cryptographic key which is mutually exchanged. Earlier passwords were stored in a single server where if an intruder gains access of that server by some malicious attacks then all the passwords stored in the database are to be compromised and therefore the e-commerce application security is endangered. In-order to improve the efficiency and performance of the aut… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

4
4,612
0
138

Year Published

1997
1997
2016
2016

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 11,176 publications
(5,075 citation statements)
references
References 9 publications
4
4,612
0
138
Order By: Relevance
“…The first obfuscation was proposed by Diffie and Hellman [9] when they did not use the obfuscation word to describe the technique. Collberg et al introduced the technique to protect Java code program.…”
Section: Related Workmentioning
confidence: 99%
“…The first obfuscation was proposed by Diffie and Hellman [9] when they did not use the obfuscation word to describe the technique. Collberg et al introduced the technique to protect Java code program.…”
Section: Related Workmentioning
confidence: 99%
“…This key can be computed through a Diffie-Hellman key agreement [23], assuming Alice and Bob can each learn discover each other's public key. An appropriate key derivation function can be used to extract K ab and a different K ba .…”
Section: Dp5 Setupmentioning
confidence: 99%
“…The first public key system was introduced by Diffie and Hellman [1] in 1976. Such a cryptosystem provides two important mechanisms, i.e., encryption and digital signatures [1]- [5].…”
Section: Introductionmentioning
confidence: 99%
“…Such a cryptosystem provides two important mechanisms, i.e., encryption and digital signatures [1]- [5]. The former ensures confidentiality while the latter guarantees integrity, authenticity [6] and non-repudiation [7].…”
Section: Introductionmentioning
confidence: 99%