Results 121 to 130 of about 400,439 (156)
Some of the next articles are maybe not open access.
Certificateless Two Party Key Agreement Protocol
2010 International Conference on Multimedia Information Networking and Security, 2010Certificateless cryptography aims at combining the advantages of identity based and public key cryptography in order to avoid the key escrow problem inherent in the identity based cryptography and cumbersome certificate management in the traditional public key infrastructure.
Liu Wenhao, Xu Chunxiang, Xu Jian
openaire +1 more source
Lightweight Certificateless Authenticated Key Agreement Protocol
Artificial Intelligence & Applications, 2023Data security and privacy are important to prevent the reveal, modification and unauthorized usage of sensitive information. The introduction of using critical power devices for internet of things (IoTs), e-commerce, e-payment, and wireless sensor networks (WSNs) has brought a new challenge of security due to the low computation capability of sensors ...
openaire +1 more source
Attack on Shao's key agreement protocol
IEE Proceedings - Information Security, 2006The paper describes a new attack on the improved robust generalised MQV key agreement protocol without using one-way hash functions proposed by Zuhua Shao.
T. Alassiry, S.-L. Ng, P. Wild
openaire +1 more source
Certificate-based authenticated key agreement protocols
2013 International Conference on Computer Applications Technology (ICCAT), 2013In this paper, the problem of establishing a shared session key in an authenticated way is addressed. New key agreement protocols that support explicit authentication are proposed. The protocols are designed in such a way that permits a trusted third party, such as a firewall, to verify the identities of the parties involved in a key agreement session.
M. Nabil +3 more
openaire +1 more source
A secure authenticated key agreement protocol
Proceedings of the 12th IEEE Mediterranean Electrotechnical Conference (IEEE Cat. No.04CH37521), 2004Authenticated key agreement protocols have an important role for building secure communications amongst two or more entities over the Internet. In this paper we propose an efficient and secure authenticated key agreement protocol based on Diffie-Hellman key agreement.
openaire +1 more source
Parallizable simple authenticated key agreement protocol
ACM SIGOPS Operating Systems Review, 2003Recently, Yeh and Sun proposed a simple authenticated key agreement protocol resistant to password guessing attacks called SAKA that is simple and cost-effective. And they provided a formal proof of security to show its strength against both passive and active adversaries.
Sung-Woon Lee +3 more
openaire +1 more source
Golden Linear Group Key Agreement Protocol
2017Security in group communication has been a significant field of research for decades. Because of the emerging technologies like cloud computing, mobile computing, ad-hoc networks, and wireless sensor networks, researchers are considering high group dynamics in communication security. Group key agreement protocol is for providing enough security for the
Mohammad Vahidalizadehdizaj +1 more
openaire +1 more source
Improving simple authentication key agreement protocol
2010 IEEE International Conference on Intelligent Computing and Intelligent Systems, 2010Simple authenticated key agreement protocol has proposed by Seo and Sweeney. They modified the Diffie-Hellman key agreement protocol to provider user authentication. We proposed an improvement of new scheme which it based on simple authenticated key agreement, and it could resist to forgery attack.
null Hui-Shan Li, null Chenglian Liu
openaire +1 more source
Unconditionally Secure Key Agreement Protocol
2001The key agreement protocol are either based on some computational infeasability, such as the calculus of the discrete logarithm in [1], or on theoretical impossibility under the assumption that Alice and Bob own specific devices such as quantum channel [2].
openaire +1 more source

