Results 21 to 30 of about 12,317,693 (236)
Post-quantum identity-based authenticated multiple key agreement protocol
Authenticated multiple key agreement (AMKA) protocols provide participants with multiple session keys after one round of authentication. Many schemes use Diffie-Hellman or authenticated key agreement schemes that rely on hard integer factorizations that ...
Yang Yang +3 more
doaj +1 more source
Polar Coding for Secure Transmission and Key Agreement [PDF]
Wyner's work on wiretap channels and the recent works on information theoretic security are based on random codes. Achieving information theoretical security with practical coding schemes is of definite interest.
Gamal, Hesham El, Koyluoglu, O. Ozan
core +3 more sources
The advancement and innovations in wireless communication technologies including the Internet of Things have massively changed the paradigms of health-based services.
Zeeshan Ashraf +2 more
doaj +1 more source
An Authentication and Secure Communication Scheme for In-Vehicle Networks Based on SOME/IP
The rapid development of intelligent networked vehicles (ICVs) has brought many positive effects. Unfortunately, connecting to the outside exposes ICVs to security threats.
Bin Ma +7 more
doaj +1 more source
SMAKA: Secure Many-to-Many Authentication and Key Agreement Scheme for Vehicular Networks
With the rising popularity of the Internet and communication technology, vehicles can analyze and judge the real-time data collected by various cloud service providers (CSPs) in a vehicular network.
Jing Zhang +4 more
semanticscholar +1 more source
An Extended Chaotic Map-Based Authentication and Key Agreement Scheme for Multi-Server Environment
With the increasing number of users and the emergence of different types of network services, a multi-server architecture has emerged in recent years.
Yicheng Yu +3 more
doaj +1 more source
Secure Authentication in the Smart Grid
Authenticated key agreement is a process in which protocol participants communicate over a public channel to share a secret session key, which is then used to encrypt data transferred in subsequent communications.
Mehdi Hosseinzadeh +4 more
doaj +1 more source
Low-power Secret-key Agreement over OFDM [PDF]
Information-theoretic secret-key agreement is perhaps the most practically feasible mechanism that provides unconditional security at the physical layer to date.
Baldi, Marco +7 more
core +2 more sources
Reusing Static Keys in Key Agreement Protocols [PDF]
Contrary to conventional cryptographic wisdom, the NIST SP 800-56A standard explicitly allows the use of a static key pair in more than one of the key establishment protocols described in the standard. In this paper, we give examples of key establishment protocols that are individually secure, but which are insecure when static key pairs are reused in ...
Chatterjee, Sanjit +2 more
openaire +2 more sources
A V2V Identity Authentication and Key Agreement Scheme Based on Identity-Based Cryptograph
Cellular vehicle to everything (C-V2X) is a technology to achieve vehicle networking, which can improve traffic efficiency and traffic safety. As a special network, the C-V2X system faces many security risks.
Qiang Li
doaj +1 more source

