Results 61 to 70 of about 400,439 (156)
Secure Key Agreement And Authentication Protocols
We consider several distributed collaborative key agreement and authentication protocols for dynamic peer groups. There are several important characteristics which make this problem different from traditional secure group communication. They are: 1) Distributed nature in which there is no centralized key server; 2) Collaborative nature in which the ...
openaire +1 more source
Identity-based efficient authentication and key agreement protocol for mobile Internet
For the bad computation overhead of bi1inear pairings in e11iptic curve and the prob1ems of certificate management in the PKI,an efficient and secure authentication key agreement protoco1 was proposed based on the identity-based cryptosystem and GDH ...
Zhen WANG, Zhao-feng MA, Shou-shan LUO
doaj +2 more sources
Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments. [PDF]
Chen CT, Lee CC, Lin IC.
europepmc +1 more source
Correction: Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments. [PDF]
Chen CT, Lee CC, Lin IC.
europepmc +1 more source
Password-Based Key Agreement Protocol
Chunbo Ma, Jun Ao, Jianhua Li
openaire +1 more source
Authenticated Tripartite Key Agreement Protocol
Chunbo Ma, Jun Ao, Jianhua Li
openaire +1 more source
Analysis of key agreement protocols
NORSK: Masteroppgaven tar for seg noen av de siste foreslåtte protokollene for nøkkel-utveksling. Ettersom de er så nye, har de ikke gjennomgått en detaljert analyse, og kan derfor inneholde sikkerhetshull. Sikkerhet i protokollene er viktig, ettersom de er ansvarlig for integriteten og konfidensialiteten til all kommunikasjon fra det øyeblikket de tas
openaire +1 more source
Robust authentication key agreement protocol for cross-domain data security
Towards the need for cross-domain data security, a corresponding system model and security model were presented, and a TEE-based robust authenticated key agreement protocol was proposed.
ZHANG Jinghui +4 more
doaj
Analysis and improvement of an ID-based authenticated key agreement protocol
The security of a recently proposed ID-based authenticated key agreement protocol was analyzed. Although it is provably secure in the standard model, a malicious PKG (private key generator) can still obtain all of the agreed ses-sion keys, that is, it ...
WANG Xiao-fen1 +2 more
doaj
An improved authenticated key agreement protocol for telecare medicine information system. [PDF]
Liu W, Xie Q, Wang S, Hu B.
europepmc +1 more source

