Results 11 to 20 of about 1,013,153 (241)

Key agreement protocol in Braid group representation level

open access: yesLietuvos Matematikos Rinkinys, 2021
In this paper the key agreement protocol is given and the applicationof it in Braid groups is suggested. The one way of protocol is being justified.
Povilas Tvarijonas   +2 more
doaj   +1 more source

Robust key agreement schemes [PDF]

open access: yes2009 IEEE International Symposium on Information Theory, 2009
This paper considers a key agreement problem in which two parties aim to agree on a key by exchanging messages in the presence of adversarial tampering. The aim of the adversary is to disrupt the key agreement process, but there are no secrecy constraints (i.e. we do not insist that the key is kept secret from the adversary).
Chan, Terence, Cai, Ning, Grant, Alex
openaire   +3 more sources

A secure authentication and key agreement scheme with dynamic management for vehicular networks

open access: yesConnection Science, 2023
The development of 5G communication, big data technology and intelligent transportation system has driven the rapid development of vehicle network (VANET).
Yuxiang Zhou   +2 more
doaj   +1 more source

Anonymous Quantum Conference Key Agreement

open access: yesPRX Quantum, 2020
Conference key agreement (CKA) is a cryptographic effort of multiple parties to establish a shared secret key. In future quantum networks, generating secret keys in an anonymous way is of tremendous importance for parties that want to keep their shared ...
Frederik Hahn, Jarn de Jong, Anna Pappa
doaj   +1 more source

Conference key agreement in a quantum network

open access: yesnpj Quantum Information, 2023
Quantum conference key agreement (QCKA) allows multiple users to establish a secure key from a shared multi-partite entangled state. In a quantum network, this protocol can be efficiently implemented using a single copy of a N-qubit Greenberger-Horne ...
Alexander Pickston   +8 more
doaj   +1 more source

Post-quantum identity-based authenticated multiple key agreement protocol

open access: yesETRI Journal, 2023
Authenticated multiple key agreement (AMKA) protocols provide participants with multiple session keys after one round of authentication. Many schemes use Diffie-Hellman or authenticated key agreement schemes that rely on hard integer factorizations that ...
Yang Yang   +3 more
doaj   +1 more source

Lightweight Privacy-Preserving Remote User Authentication and Key Agreement Protocol for Next-Generation IoT-Based Smart Healthcare

open access: yesFuture Internet, 2023
The advancement and innovations in wireless communication technologies including the Internet of Things have massively changed the paradigms of health-based services.
Zeeshan Ashraf   +2 more
doaj   +1 more source

An Authentication and Secure Communication Scheme for In-Vehicle Networks Based on SOME/IP

open access: yesSensors, 2022
The rapid development of intelligent networked vehicles (ICVs) has brought many positive effects. Unfortunately, connecting to the outside exposes ICVs to security threats.
Bin Ma   +7 more
doaj   +1 more source

An Extended Chaotic Map-Based Authentication and Key Agreement Scheme for Multi-Server Environment

open access: yesMathematics, 2021
With the increasing number of users and the emergence of different types of network services, a multi-server architecture has emerged in recent years.
Yicheng Yu   +3 more
doaj   +1 more source

Secure Authentication in the Smart Grid

open access: yesMathematics, 2022
Authenticated key agreement is a process in which protocol participants communicate over a public channel to share a secret session key, which is then used to encrypt data transferred in subsequent communications.
Mehdi Hosseinzadeh   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy