Results 31 to 40 of about 401,573 (156)

Neural Key Agreement Protocol with Extended Security

open access: yesApplied Sciences
Key agreement protocols based on neural synchronization with Tree Parity Machines (TPMs) offer promising security advantages: they do not rely on trapdoor functions, making them resistant to quantum attacks, and they avoid the need for specialized ...
Mihail-Iulian Pleşa   +2 more
doaj   +1 more source

Attribute-based authenticated key agreement protocol supporting revocation

open access: yesTongxin xuebao, 2014
Revocation is a crucial issue for the practical use of attribute-based authenticated key agreement (ABAKA) protocols. A new ABAKA protocol supporting revocation was proposed.
Qiang LI, Deng-guo FENG, Li-wu ZHANG
doaj   +2 more sources

AN EFFICIENT TWO-SERVER AUTHENTICATION AND KEY EXCHANGE PROTOCOL FOR ACCESSING SECURE CLOUD SERVICES [PDF]

open access: yesJordanian Journal of Computers and Information Technology, 2018
To avail cloud services namely Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS), etc. via insecure channel, it is necessary to establish a symmetric key between end user and remote Cloud Service Server (CSS).
Durbadal Chattaraj   +2 more
doaj   +1 more source

Security of Neural Network-Based Key Agreement Protocol for Smart Grids

open access: yesEnergies, 2023
Recent developments in quantum computing pose a significant threat to the asymmetric cryptography currently in use. Neural cryptography offers a potential alternative that is resistant to attacks of known quantum computer algorithms.
Miłosz Stypiński, Marcin Niemiec
doaj   +1 more source

An Enhanced Identity-based Authentication Key Agreement Protocol for Mobile Internet [PDF]

open access: yesJisuanji gongcheng, 2019
To address the problems of time-consuming bilinear pairings and the heavy burden of PKI certificate management,WANG Z,et al.proposed an identity-based efficient Authentication Key Agreement(AKA) protocol for mobile Internet(Journal of Communications,2017,
SUN Haiyan, LI Lingling, ZHANG Ling, ZHANG Jianwei, HUANG Wanwei
doaj   +1 more source

EN-LAKP: Lightweight Authentication and Key Agreement Protocol for Emerging Networks

open access: yesIEEE Access, 2023
In the next generation, emerging network technologies like Software Defined Networking (SDN) and Wireless Sensor Networks (WSNs) will be developed and deployed to improve computing facilities.
Nemalikanti Anand, M. A. Saifulla
doaj   +1 more source

Key Escrow Protocol Based on a Tripartite Authenticated Key Agreement and Threshold Cryptography

open access: yesIEEE Access, 2019
While instant messaging systems bring convenience to people's lives and work, they also make it easier for malicious users to discuss and plot illegal activities.
Zhen Wang   +3 more
doaj   +1 more source

Improved authenticated multiple-key agreement protocol

open access: yesComputers & Mathematics with Applications, 2003
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Yeh, Her-Tyan   +2 more
openaire   +1 more source

Security-Enhanced Lightweight Authentication Key-Agreement Protocol for Unmanned Aerial Vehicle Communication

open access: yesApplied Sciences
Unmanned aerial vehicles have been widely employed in recent years owing to their remarkable features such as low environmental requirements and high survivability, and a new tendency towards networking, intelligence, and collaboration has emerged.
Zhoucan He   +5 more
doaj   +1 more source

Improved authenticated multiple-key agreement protocol

open access: yesElectronics Letters, 1998
Recently, Harn and Lin (1998) developed a two-phase authenticated key agreement protocol which enables two parties to share multiple secret keys. The first phase of their protocol is the most important part and can be used to deliver a sequence of temporary random public keys to the other party in an authenticated approach.
Sung-Ming Yen, M. Joye
openaire   +1 more source

Home - About - Disclaimer - Privacy