{"?xml":{"@version":"1.0"},"edm:RDF":{"@xmlns:dc":"http://purl.org/dc/elements/1.1/","@xmlns:edm":"http://www.europeana.eu/schemas/edm/","@xmlns:wgs84_pos":"http://www.w3.org/2003/01/geo/wgs84_pos","@xmlns:foaf":"http://xmlns.com/foaf/0.1/","@xmlns:rdaGr2":"http://rdvocab.info/ElementsGr2","@xmlns:oai":"http://www.openarchives.org/OAI/2.0/","@xmlns:owl":"http://www.w3.org/2002/07/owl#","@xmlns:rdf":"http://www.w3.org/1999/02/22-rdf-syntax-ns#","@xmlns:ore":"http://www.openarchives.org/ore/terms/","@xmlns:skos":"http://www.w3.org/2004/02/skos/core#","@xmlns:dcterms":"http://purl.org/dc/terms/","edm:WebResource":[{"@rdf:about":"http://www.dlib.si/stream/URN:NBN:SI:DOC-DH1IFTXC/6ce9bbce-a052-4b10-b388-a57bfbebc878/PDF","dcterms:extent":"271 KB"},{"@rdf:about":"http://www.dlib.si/stream/URN:NBN:SI:DOC-DH1IFTXC/45d3de6e-43c7-46a9-87fb-7172da97b44e/TEXT","dcterms:extent":"40 KB"}],"edm:TimeSpan":{"@rdf:about":"1977-2026","edm:begin":{"@xml:lang":"en","#text":"1977"},"edm:end":{"@xml:lang":"en","#text":"2026"}},"edm:ProvidedCHO":{"@rdf:about":"URN:NBN:SI:DOC-DH1IFTXC","dcterms:isPartOf":[{"@rdf:resource":"https://www.dlib.si/details/URN:NBN:SI:spr-EE5UIE2V"},{"@xml:lang":"sl","#text":"Informatica (Ljubljana)"}],"dcterms:issued":"2009","dc:creator":["Brumen, Boštjan","Hölbl, Marko","Welzer-Družovec, Tatjana"],"dc:format":[{"@xml:lang":"sl","#text":"številka:3"},{"@xml:lang":"sl","#text":"letnik:33"},{"@xml:lang":"sl","#text":"str. 347-355"}],"dc:identifier":["ISSN:0350-5596","COBISSID:13512982","URN:URN:NBN:SI:doc-DH1IFTXC"],"dc:language":"en","dc:publisher":{"@xml:lang":"sl","#text":"Slovensko društvo Informatika"},"dc:subject":[{"@xml:lang":"sl","#text":"avtentičnost"},{"@xml:lang":"sl","#text":"identiteta"},{"@xml:lang":"sl","#text":"informatika"},{"@xml:lang":"en","#text":"information science"},{"@xml:lang":"en","#text":"security"},{"@xml:lang":"sl","#text":"varnost"},{"@rdf:resource":"http://www.wikidata.org/entity/Q2526135"}],"dcterms:temporal":{"@rdf:resource":"1977-2026"},"dc:title":{"@xml:lang":"sl","#text":"Comparative study of tripartite identity-based authenticated key agreement protocols|"},"dc:description":[{"@xml:lang":"sl","#text":"Key agreement protocols are used to exchange keys between two or multiple entities. The exchanged key can be later used to assure confidentiality through encryption. Additionally authenticated key agreement protocols offer implicit authentication. In this paper we conduct a security and efficiency comparison of tripartite authenticated identity-based key agreement protocols and review all of the protocols from the group. From the security perspective the protocols are compared with respect to the level to which they comply withdefined security properties for authenticated key agreement protocols and the number of known attacks, whereas from the efficiency perspective the protocols are compared regarding computational effort. The comparative study enables in-depth analysis of existing protocols and the development of new ones"},{"@xml:lang":"sl","#text":"Podana je primerjava protokolov za izmenjavo ključev"}],"edm:type":"TEXT","dc:type":[{"@xml:lang":"sl","#text":"znanstveno časopisje"},{"@xml:lang":"en","#text":"journals"},{"@rdf:resource":"http://www.wikidata.org/entity/Q361785"}]},"ore:Aggregation":{"@rdf:about":"http://www.dlib.si/?URN=URN:NBN:SI:DOC-DH1IFTXC","edm:aggregatedCHO":{"@rdf:resource":"URN:NBN:SI:DOC-DH1IFTXC"},"edm:isShownBy":{"@rdf:resource":"http://www.dlib.si/stream/URN:NBN:SI:DOC-DH1IFTXC/6ce9bbce-a052-4b10-b388-a57bfbebc878/PDF"},"edm:rights":{"@rdf:resource":"http://rightsstatements.org/vocab/InC/1.0/"},"edm:provider":"Slovenian National E-content Aggregator","edm:intermediateProvider":{"@xml:lang":"en","#text":"National and University Library of Slovenia"},"edm:dataProvider":{"@xml:lang":"sl","#text":"Slovensko društvo Informatika"},"edm:object":{"@rdf:resource":"http://www.dlib.si/streamdb/URN:NBN:SI:DOC-DH1IFTXC/maxi/edm"},"edm:isShownAt":{"@rdf:resource":"http://www.dlib.si/details/URN:NBN:SI:DOC-DH1IFTXC"}}}}