dc.contributor.advisor | Gjøsteen, Kristian | nb_NO |
dc.contributor.author | Henriksen, Ragne Elisabeth | nb_NO |
dc.date.accessioned | 2014-12-19T13:59:50Z | |
dc.date.available | 2014-12-19T13:59:50Z | |
dc.date.created | 2012-11-08 | nb_NO |
dc.date.issued | 2012 | nb_NO |
dc.identifier | 566189 | nb_NO |
dc.identifier | ntnudaim:7471 | nb_NO |
dc.identifier.uri | http://hdl.handle.net/11250/259031 | |
dc.description.abstract | This thesis summarizes an existing protocol, that we have chosen to call the Token Key Agreement protocol. It then goes on to introduce two new protocols we have chosen to name the Symmetric Key Agreement protocol and the Asymmetric Key Agreement protocol. We are working within the UC framework, and as such introduce ideal functionalities and protocol descriptions for the protocols. For the first protocol we also introduce a simulated adversary. Further, the paper includes an overview of the security offered by the three protocols. | nb_NO |
dc.language | eng | nb_NO |
dc.publisher | Institutt for matematiske fag | nb_NO |
dc.subject | ntnudaim:7471 | no_NO |
dc.subject | MTFYMA fysikk og matematikk | no_NO |
dc.subject | Industriell matematikk | no_NO |
dc.title | Anonymity in Network Connections for Mobile Communication | nb_NO |
dc.type | Master thesis | nb_NO |
dc.source.pagenumber | 89 | nb_NO |
dc.contributor.department | Norges teknisk-naturvitenskapelige universitet, Fakultet for informasjonsteknologi, matematikk og elektroteknikk, Institutt for matematiske fag | nb_NO |