Results 111 to 120 of about 401,573 (156)
Some of the next articles are maybe not open access.
A simple key agreement protocol
IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings., 2004We propose a simple key agreement protocol(SKA) that provides key establishment with authentication over an insecure channel using only a human memorable password. The SKA is based on Diffie-Hellman scheme and has many of desirable security attributes: it resists off-line dictionary attacks mounted by either passive or active adversaries over network ...
null Eun-Kyung Ryu +2 more
openaire +1 more source
Cryptographic Key Agreement Protocol Simulation
2010 Sixth International Conference on Semantics, Knowledge and Grids, 2010The High Assurance Internet Protocol Encrypt or (HAIPE) Interoperability Specification is developed by the US Department of Defense to permit enclaves equipped with compliant gateways to communicate securely over un-trusted networks. Using Cryptographic Key Agreement protocol, e.g., Internet Key Exchange (IKE), HAIPEs can establish automated security ...
Zhang Chuan-fu +3 more
openaire +1 more source
New authenticated key agreement protocols
The 2011 International Conference on Computer Engineering & Systems, 2011Key agreement protocols are used to establish common keys between two or more entities. The established key can then be used to assure confidentiality of exchanged messages through encryption. Additionally, authenticated key agreement protocols offer implicit authentication.
Hassan M. Elkamchouchi +2 more
openaire +1 more source
An Efficient Protocol for Authenticated Key Agreement
Designs, Codes and Cryptography, 2003zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Law, Laurie +4 more
openaire +1 more source
Certificateless Key Agreement Protocol
2010 2nd International Conference on E-business and Information System Security, 2010Certificateless cryptography aims at combining the advantages of identity based and public key cryptography in order to avoid the key escrow problem inherent in the identity based cryptography and cumbersome certificate management in the traditional public key infrastructure.
openaire +1 more source
An Improved Conference Key Agreement Protocol
2008 International Conference on Computational Intelligence and Security, 2008A conference-key protocol is used to establish a common conference key K such that a group of people can communicate securely over a public network. To improve the implementation efficiency of Tzeng?s conference-key agreement protocol, an efficient conference-key agreement protocol is proposed under the authenticated broadcast channel.
Xing-lan Zhang, Quan-min Wang
openaire +1 more source
Improved authenticated multi-key agreement protocol
Wuhan University Journal of Natural Sciences, 2006zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Zhang, Hua, Yuan, Zheng, Wen, Qiaoyan
openaire +2 more sources
Secure Group Key Agreement Protocols
2018This chapter focusses on Secure Key Exchange protocols executed among a group of parties, called group key exchange (GKE) protocols. Authentication and Key Establishment are very important in any secure communication. Authentication is generally based on long-term keys which can be associated with identities. To associate identities with long-term keys,
Kannan Balasubramanian, Mala K.
openaire +1 more source
An improved authenticated key agreement protocol
Journal of Electronics (China), 2005In 1999, Seo and Sweeney proposed a simple authenticated key agreement protocol that was designed to act as a Diffie-Hellman key agreement protocol with user authentication. Various attacks on this protocol are described and enhanced in the literature. Recently, Ku and Wang proposed an improved authenticated key agreement protocol, where they asserted ...
Changji Wang, Bo Yang, Jianping Wu
openaire +1 more source
Certificateless Two Party Key Agreement Protocol
2010 International Conference on Multimedia Information Networking and Security, 2010Certificateless cryptography aims at combining the advantages of identity based and public key cryptography in order to avoid the key escrow problem inherent in the identity based cryptography and cumbersome certificate management in the traditional public key infrastructure.
Liu Wenhao, Xu Chunxiang, Xu Jian
openaire +1 more source

