Results 61 to 70 of about 401,573 (156)

Identity-based efficient authentication and key agreement protocol for mobile Internet

open access: yesTongxin xuebao, 2017
For the bad computation overhead of bi1inear pairings in e11iptic curve and the prob1ems of certificate management in the PKI,an efficient and secure authentication key agreement protoco1 was proposed based on the identity-based cryptosystem and GDH ...
Zhen WANG, Zhao-feng MA, Shou-shan LUO
doaj   +2 more sources

Password-Based Key Agreement Protocol

open access: yesInformation Technology Journal, 2007
Chunbo Ma, Jun Ao, Jianhua Li
openaire   +1 more source

Authenticated Tripartite Key Agreement Protocol

open access: yesInformation Technology Journal, 2007
Chunbo Ma, Jun Ao, Jianhua Li
openaire   +1 more source

Robust authentication key agreement protocol for cross-domain data security

open access: yesTongxin xuebao
Towards the need for cross-domain data security, a corresponding system model and security model were presented, and a TEE-based robust authenticated key agreement protocol was proposed.
ZHANG Jinghui   +4 more
doaj  

Analysis and improvement of an ID-based authenticated key agreement protocol

open access: yesTongxin xuebao, 2008
The security of a recently proposed ID-based authenticated key agreement protocol was analyzed. Although it is provably secure in the standard model, a malicious PKG (private key generator) can still obtain all of the agreed ses-sion keys, that is, it ...
WANG Xiao-fen1   +2 more
doaj  

Analysis of key agreement protocols

open access: yes, 2006
NORSK: Masteroppgaven tar for seg noen av de siste foreslåtte protokollene for nøkkel-utveksling. Ettersom de er så nye, har de ikke gjennomgått en detaljert analyse, og kan derfor inneholde sikkerhetshull. Sikkerhet i protokollene er viktig, ettersom de er ansvarlig for integriteten og konfidensialiteten til all kommunikasjon fra det øyeblikket de tas
openaire   +1 more source

Home - About - Disclaimer - Privacy