Results 51 to 60 of about 400,439 (156)

A secure key agreement protocol

open access: yesJournal of Information and Organizational Sciences, 2001
Summary: We propose a secure protocol for an authenticated key agreement based on the Diffie-Hellman key agreement, which works in an elliptic curve group. We prove that our protocol meets certain security attributes under the assumption that the elliptic curve discrete logarithm problem is secure.
openaire   +2 more sources

Lightweight authentication key agreement protocol for Internet of vehicles

open access: yesTongxin xuebao
An analysis of the two-stage authentication and key agreement protocol for commuting in Internet of vehicles proposed by Zhang et al. revealed its vulnerability to various malicious attacks, which included secret leakage attack and man-in-the-middle ...
LIU Yali   +4 more
doaj   +2 more sources

Three-party password authenticated key agreement protocol with user anonymity based on lattice

open access: yesTongxin xuebao, 2018
With the rapid development of quantum theory and the existence of polynomial algorithm in quantum computation based on discrete logarithm problem and large integer decomposition problem,the security of the algorithm was seriously threatened.Therefore,two
Caifen WANG, Li CHEN
doaj   +2 more sources

Authenticated Diffe-Hellman Key Agreement Protocols [PDF]

open access: yes, 1999
This paper surveys recent work on the design and analysis of key agreement protocols that are based on the intractability of the Diffie-Hellman problem. The focus is on protocols that have been standardized, or are in the process of being standardized, by organizations such as ANSI, IEEE, ISO/IEC, and NIST.
Simon Blake-Wilson, Alfred Menezes
openaire   +1 more source

EAP-Based Group Authentication and Key Agreement Protocol for Machine-Type Communications

open access: yesInternational Journal of Distributed Sensor Networks, 2013
Machine to machine (M2M) communications, also called machine-type communications (MTC), has widely been utilized in applications such as telemetry, industrial, automation, and SCADA systems.
Rong Jiang   +4 more
doaj   +1 more source

Secret sharing-based authentication and key agreement protocol for machine-type communications

open access: yesInternational Journal of Distributed Sensor Networks, 2019
One of the main challenges for the development of the Internet of Things is the authentication of large numbers of devices/sensors, commonly served by massive machine-type communications, which jointly with long-term evolution has been considered one of ...
Ana Paula G Lopes   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy