Results 51 to 60 of about 401,573 (156)

A secure key agreement protocol

open access: yesJournal of Information and Organizational Sciences, 2001
Summary: We propose a secure protocol for an authenticated key agreement based on the Diffie-Hellman key agreement, which works in an elliptic curve group. We prove that our protocol meets certain security attributes under the assumption that the elliptic curve discrete logarithm problem is secure.
openaire   +2 more sources

Lightweight authentication key agreement protocol for Internet of vehicles

open access: yesTongxin xuebao
An analysis of the two-stage authentication and key agreement protocol for commuting in Internet of vehicles proposed by Zhang et al. revealed its vulnerability to various malicious attacks, which included secret leakage attack and man-in-the-middle ...
LIU Yali   +4 more
doaj   +2 more sources

Three-party password authenticated key agreement protocol with user anonymity based on lattice

open access: yesTongxin xuebao, 2018
With the rapid development of quantum theory and the existence of polynomial algorithm in quantum computation based on discrete logarithm problem and large integer decomposition problem,the security of the algorithm was seriously threatened.Therefore,two
Caifen WANG, Li CHEN
doaj   +2 more sources

EAP-Based Group Authentication and Key Agreement Protocol for Machine-Type Communications

open access: yesInternational Journal of Distributed Sensor Networks, 2013
Machine to machine (M2M) communications, also called machine-type communications (MTC), has widely been utilized in applications such as telemetry, industrial, automation, and SCADA systems.
Rong Jiang   +4 more
doaj   +1 more source

Secret sharing-based authentication and key agreement protocol for machine-type communications

open access: yesInternational Journal of Distributed Sensor Networks, 2019
One of the main challenges for the development of the Internet of Things is the authentication of large numbers of devices/sensors, commonly served by massive machine-type communications, which jointly with long-term evolution has been considered one of ...
Ana Paula G Lopes   +3 more
doaj   +1 more source

Secure Key Agreement And Authentication Protocols

open access: yesInternational Journal of Computer Science & Engineering Survey, 2012
We consider several distributed collaborative key agreement and authentication protocols for dynamic peer groups. There are several important characteristics which make this problem different from traditional secure group communication. They are: 1) Distributed nature in which there is no centralized key server; 2) Collaborative nature in which the ...
openaire   +1 more source

Home - About - Disclaimer - Privacy