Vis enkel innførsel

dc.contributor.advisorGjøsteen, Kristiannb_NO
dc.contributor.authorHenriksen, Ragne Elisabethnb_NO
dc.date.accessioned2014-12-19T13:59:50Z
dc.date.available2014-12-19T13:59:50Z
dc.date.created2012-11-08nb_NO
dc.date.issued2012nb_NO
dc.identifier566189nb_NO
dc.identifierntnudaim:7471nb_NO
dc.identifier.urihttp://hdl.handle.net/11250/259031
dc.description.abstractThis thesis summarizes an existing protocol, that we have chosen to call the Token Key Agreement protocol. It then goes on to introduce two new protocols we have chosen to name the Symmetric Key Agreement protocol and the Asymmetric Key Agreement protocol. We are working within the UC framework, and as such introduce ideal functionalities and protocol descriptions for the protocols. For the first protocol we also introduce a simulated adversary. Further, the paper includes an overview of the security offered by the three protocols.nb_NO
dc.languageengnb_NO
dc.publisherInstitutt for matematiske fagnb_NO
dc.subjectntnudaim:7471no_NO
dc.subjectMTFYMA fysikk og matematikkno_NO
dc.subjectIndustriell matematikkno_NO
dc.titleAnonymity in Network Connections for Mobile Communicationnb_NO
dc.typeMaster thesisnb_NO
dc.source.pagenumber89nb_NO
dc.contributor.departmentNorges teknisk-naturvitenskapelige universitet, Fakultet for informasjonsteknologi, matematikk og elektroteknikk, Institutt for matematiske fagnb_NO


Tilhørende fil(er)

Thumbnail
Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel