The first edition of this book was published in 2003. Inevitably, certain parts of the book became outdated quickly. At the same time new developments have continued apace …
In this article, we focus on the problem of large-scale instance-level image retrieval. For efficiency reasons, it is common to represent an image by a fixed-length descriptor which is …
J Zhao, D Gu - Information Sciences, 2012 - Elsevier
A three-party password-based authenticated key exchange (3PAKE) protocol is a useful mechanism to establish a secure session key in a network. However, most current 3PAKE …
AA Kaur, KK Mustafa - International Journal of Computer Network …, 2019 - mecs-press.org
There is no doubt that, even after the development of many other authentication schemes, passwords remain one of the most popular means of authentication. A review in the field of …
J Zhao, D Gu, MC Gorantla - Proceedings of the 6th ACM Symposium on …, 2011 - dl.acm.org
In PKC 2009, Gorantla, Boyd and González Nieto presented a nice result on modelling security for group key agreement (GKA) protocols. They proposed a novel security model …
J Nam, KKR Choo, J Kim, HK Kang… - The Scientific World …, 2014 - Wiley Online Library
Protocols for password‐only authenticated key exchange (PAKE) in the three‐party setting allow two clients registered with the same authentication server to derive a common secret …
We present the first provably-secure three-party password-only authenticated key exchange (PAKE) protocol that can run in only two communication rounds. Our protocol is generic in …
K Yoneyama - … Applications: 11th International Workshop, WISA 2010 …, 2011 - Springer
In this paper, we extend password-based server aided key exchange (PSAKE) to the cross- realm setting which two clients in two different realms with different passwords can …