Results 31 to 40 of about 401,573 (156)
Neural Key Agreement Protocol with Extended Security
Key agreement protocols based on neural synchronization with Tree Parity Machines (TPMs) offer promising security advantages: they do not rely on trapdoor functions, making them resistant to quantum attacks, and they avoid the need for specialized ...
Mihail-Iulian Pleşa +2 more
doaj +1 more source
Attribute-based authenticated key agreement protocol supporting revocation
Revocation is a crucial issue for the practical use of attribute-based authenticated key agreement (ABAKA) protocols. A new ABAKA protocol supporting revocation was proposed.
Qiang LI, Deng-guo FENG, Li-wu ZHANG
doaj +2 more sources
AN EFFICIENT TWO-SERVER AUTHENTICATION AND KEY EXCHANGE PROTOCOL FOR ACCESSING SECURE CLOUD SERVICES [PDF]
To avail cloud services namely Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS), etc. via insecure channel, it is necessary to establish a symmetric key between end user and remote Cloud Service Server (CSS).
Durbadal Chattaraj +2 more
doaj +1 more source
Security of Neural Network-Based Key Agreement Protocol for Smart Grids
Recent developments in quantum computing pose a significant threat to the asymmetric cryptography currently in use. Neural cryptography offers a potential alternative that is resistant to attacks of known quantum computer algorithms.
Miłosz Stypiński, Marcin Niemiec
doaj +1 more source
An Enhanced Identity-based Authentication Key Agreement Protocol for Mobile Internet [PDF]
To address the problems of time-consuming bilinear pairings and the heavy burden of PKI certificate management,WANG Z,et al.proposed an identity-based efficient Authentication Key Agreement(AKA) protocol for mobile Internet(Journal of Communications,2017,
SUN Haiyan, LI Lingling, ZHANG Ling, ZHANG Jianwei, HUANG Wanwei
doaj +1 more source
EN-LAKP: Lightweight Authentication and Key Agreement Protocol for Emerging Networks
In the next generation, emerging network technologies like Software Defined Networking (SDN) and Wireless Sensor Networks (WSNs) will be developed and deployed to improve computing facilities.
Nemalikanti Anand, M. A. Saifulla
doaj +1 more source
Key Escrow Protocol Based on a Tripartite Authenticated Key Agreement and Threshold Cryptography
While instant messaging systems bring convenience to people's lives and work, they also make it easier for malicious users to discuss and plot illegal activities.
Zhen Wang +3 more
doaj +1 more source
Improved authenticated multiple-key agreement protocol
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Yeh, Her-Tyan +2 more
openaire +1 more source
Unmanned aerial vehicles have been widely employed in recent years owing to their remarkable features such as low environmental requirements and high survivability, and a new tendency towards networking, intelligence, and collaboration has emerged.
Zhoucan He +5 more
doaj +1 more source
Improved authenticated multiple-key agreement protocol
Recently, Harn and Lin (1998) developed a two-phase authenticated key agreement protocol which enables two parties to share multiple secret keys. The first phase of their protocol is the most important part and can be used to deliver a sequence of temporary random public keys to the other party in an authenticated approach.
Sung-Ming Yen, M. Joye
openaire +1 more source

