Results 11 to 20 of about 1,013,153 (241)
Key agreement protocol in Braid group representation level
In this paper the key agreement protocol is given and the applicationof it in Braid groups is suggested. The one way of protocol is being justified.
Povilas Tvarijonas +2 more
doaj +1 more source
Robust key agreement schemes [PDF]
This paper considers a key agreement problem in which two parties aim to agree on a key by exchanging messages in the presence of adversarial tampering. The aim of the adversary is to disrupt the key agreement process, but there are no secrecy constraints (i.e. we do not insist that the key is kept secret from the adversary).
Chan, Terence, Cai, Ning, Grant, Alex
openaire +3 more sources
A secure authentication and key agreement scheme with dynamic management for vehicular networks
The development of 5G communication, big data technology and intelligent transportation system has driven the rapid development of vehicle network (VANET).
Yuxiang Zhou +2 more
doaj +1 more source
Anonymous Quantum Conference Key Agreement
Conference key agreement (CKA) is a cryptographic effort of multiple parties to establish a shared secret key. In future quantum networks, generating secret keys in an anonymous way is of tremendous importance for parties that want to keep their shared ...
Frederik Hahn, Jarn de Jong, Anna Pappa
doaj +1 more source
Conference key agreement in a quantum network
Quantum conference key agreement (QCKA) allows multiple users to establish a secure key from a shared multi-partite entangled state. In a quantum network, this protocol can be efficiently implemented using a single copy of a N-qubit Greenberger-Horne ...
Alexander Pickston +8 more
doaj +1 more source
Post-quantum identity-based authenticated multiple key agreement protocol
Authenticated multiple key agreement (AMKA) protocols provide participants with multiple session keys after one round of authentication. Many schemes use Diffie-Hellman or authenticated key agreement schemes that rely on hard integer factorizations that ...
Yang Yang +3 more
doaj +1 more source
The advancement and innovations in wireless communication technologies including the Internet of Things have massively changed the paradigms of health-based services.
Zeeshan Ashraf +2 more
doaj +1 more source
An Authentication and Secure Communication Scheme for In-Vehicle Networks Based on SOME/IP
The rapid development of intelligent networked vehicles (ICVs) has brought many positive effects. Unfortunately, connecting to the outside exposes ICVs to security threats.
Bin Ma +7 more
doaj +1 more source
An Extended Chaotic Map-Based Authentication and Key Agreement Scheme for Multi-Server Environment
With the increasing number of users and the emergence of different types of network services, a multi-server architecture has emerged in recent years.
Yicheng Yu +3 more
doaj +1 more source
Secure Authentication in the Smart Grid
Authenticated key agreement is a process in which protocol participants communicate over a public channel to share a secret session key, which is then used to encrypt data transferred in subsequent communications.
Mehdi Hosseinzadeh +4 more
doaj +1 more source

