Results 121 to 130 of about 400,439 (156)
Some of the next articles are maybe not open access.

Certificateless Two Party Key Agreement Protocol

2010 International Conference on Multimedia Information Networking and Security, 2010
Certificateless cryptography aims at combining the advantages of identity based and public key cryptography in order to avoid the key escrow problem inherent in the identity based cryptography and cumbersome certificate management in the traditional public key infrastructure.
Liu Wenhao, Xu Chunxiang, Xu Jian
openaire   +1 more source

Lightweight Certificateless Authenticated Key Agreement Protocol

Artificial Intelligence & Applications, 2023
Data security and privacy are important to prevent the reveal, modification and unauthorized usage of sensitive information. The introduction of using critical power devices for internet of things (IoTs), e-commerce, e-payment, and wireless sensor networks (WSNs) has brought a new challenge of security due to the low computation capability of sensors ...
openaire   +1 more source

Attack on Shao's key agreement protocol

IEE Proceedings - Information Security, 2006
The paper describes a new attack on the improved robust generalised MQV key agreement protocol without using one-way hash functions proposed by Zuhua Shao.
T. Alassiry, S.-L. Ng, P. Wild
openaire   +1 more source

Certificate-based authenticated key agreement protocols

2013 International Conference on Computer Applications Technology (ICCAT), 2013
In this paper, the problem of establishing a shared session key in an authenticated way is addressed. New key agreement protocols that support explicit authentication are proposed. The protocols are designed in such a way that permits a trusted third party, such as a firewall, to verify the identities of the parties involved in a key agreement session.
M. Nabil   +3 more
openaire   +1 more source

A secure authenticated key agreement protocol

Proceedings of the 12th IEEE Mediterranean Electrotechnical Conference (IEEE Cat. No.04CH37521), 2004
Authenticated key agreement protocols have an important role for building secure communications amongst two or more entities over the Internet. In this paper we propose an efficient and secure authenticated key agreement protocol based on Diffie-Hellman key agreement.
openaire   +1 more source

Parallizable simple authenticated key agreement protocol

ACM SIGOPS Operating Systems Review, 2003
Recently, Yeh and Sun proposed a simple authenticated key agreement protocol resistant to password guessing attacks called SAKA that is simple and cost-effective. And they provided a formal proof of security to show its strength against both passive and active adversaries.
Sung-Woon Lee   +3 more
openaire   +1 more source

Golden Linear Group Key Agreement Protocol

2017
Security in group communication has been a significant field of research for decades. Because of the emerging technologies like cloud computing, mobile computing, ad-hoc networks, and wireless sensor networks, researchers are considering high group dynamics in communication security. Group key agreement protocol is for providing enough security for the
Mohammad Vahidalizadehdizaj   +1 more
openaire   +1 more source

Improving simple authentication key agreement protocol

2010 IEEE International Conference on Intelligent Computing and Intelligent Systems, 2010
Simple authenticated key agreement protocol has proposed by Seo and Sweeney. They modified the Diffie-Hellman key agreement protocol to provider user authentication. We proposed an improvement of new scheme which it based on simple authenticated key agreement, and it could resist to forgery attack.
null Hui-Shan Li, null Chenglian Liu
openaire   +1 more source

Unconditionally Secure Key Agreement Protocol

2001
The key agreement protocol are either based on some computational infeasability, such as the calculus of the discrete logarithm in [1], or on theoretical impossibility under the assumption that Alice and Bob own specific devices such as quantum channel [2].
openaire   +1 more source

Home - About - Disclaimer - Privacy