Results 1 to 10 of about 400,439 (156)

Highly Efficient Symmetric Key Based Authentication and Key Agreement Protocol Using Keccak [PDF]

open access: yesSensors, 2020
Efficient authentication and key agreement protocols between two entities are required in many application areas. In particular, for client–server type of architectures, the client is mostly represented by a constrained device and thus highly efficient ...
An Braeken
doaj   +2 more sources

Cryptanalysis and improved mutual authentication key agreement protocol using pseudo-identity. [PDF]

open access: yesPLoS ONE, 2022
The authentication key agreement is a scheme that generates a session key for encrypted communication between two participants. In the authentication key agreement, to provide the mutual authentication and the robust session key agreement is one of the ...
Hyang-Rim Jo   +3 more
doaj   +2 more sources

A Blockchain-Based Authentication and Dynamic Group Key Agreement Protocol [PDF]

open access: yesSensors, 2020
With the rapid development of mobile networks, there are more and more application scenarios that require group communication. For example, in mobile edge computing, group communication can be used to transmit messages to all group members with minimal ...
Zisang Xu   +5 more
doaj   +2 more sources

Freshness-Preserving Non-Interactive Hierarchical Key Agreement Protocol over WHMS [PDF]

open access: yesSensors, 2014
The digitization of patient health information (PHI) for wireless health monitoring systems (WHMSs) has brought many benefits and challenges for both patients and physicians.
Hyunsung Kim
doaj   +2 more sources

A Lightweight Key Agreement Protocol Based on Chinese Remainder Theorem and ECDH for Smart Homes [PDF]

open access: yesSensors, 2020
Security and efficiency are the two main challenges for designing a smart home system. In this paper, by incorporating Chinese remainder theorem (CRT) into the elliptic curve Diffie−Hellman (ECDH), a lightweight key agreement protocol for smart ...
Yi Jiang, Yong Shen, Qingyi Zhu
doaj   +2 more sources

Hierarchical certificateless authenticated key agreement protocol

open access: yesTongxin xuebao, 2016
A hierarchical certificateless authenticated key agreement protocol was proposed, and the proposed protocol was proved secure in extended Canetti-Krawczyk (eCK) model, the security of the protocol was based on the computa-tional Diffie-Hellman assumption.
Hang SU, Jian-wei LIU, Rui TAO
doaj   +3 more sources

Authentication and Key Agreement Protocol for UAV Communication [PDF]

open access: yesJisuanji kexue, 2022
In order to achieve the requirement for security and lightweight in unmanned aerial vehicle(UAV)communication,two authentication and key agreement protocols targeted for UAVs with different computational performance are proposed,including an ECC based ...
JIAN Qi-rui, CHEN Ze-mao, WU Xiao-kang
doaj   +1 more source

Key agreement protocol in Braid group representation level

open access: yesLietuvos Matematikos Rinkinys, 2021
In this paper the key agreement protocol is given and the applicationof it in Braid groups is suggested. The one way of protocol is being justified.
Povilas Tvarijonas   +2 more
doaj   +1 more source

Comment on “Quantum key agreement protocol” [PDF]

open access: yesInternational Journal of Quantum Information, 2020
The first two-party Quantum Key Agreement (QKA) protocol, based on quantum teleportation, was proposed by Zhou et al. (Electron. Lett. 40(18) (2004) 1149). In this protocol, to obtain the key bit string, one of the parties uses a device to obtain the inner product of two quantum states, one being unknown, and the other one performs Bell measurement ...
Nayana Das, Ritajit Majumdar
openaire   +2 more sources

Home - About - Disclaimer - Privacy