Zobrazeno 1 - 10
of 498
pro vyhledávání: '"Oakley protocol"'
Publikováno v:
Discrete Applied Mathematics. 241:78-86
Password-authenticated group key exchange (PGKE) protocols are critical for ensuring secure group communications for mobile devices. Until now, only few PGKE protocols have been proposed. However, literature about group key exchange (GKE) protocols c
Publikováno v:
Wireless Personal Communications. 97:2551-2579
Nicanfar and Leung proposed a multilayer consensus elliptic curve based password authenticated key-exchange (MCEPAK) protocol for smart grid. They claimed that their protocol is secure against possible attacks. In this paper, we show that the MCEPAK
Publikováno v:
Wireless Personal Communications. 96:1451-1474
Anonymous password authenticated key exchange (APAKE) allows a client holding a low-entropy password to establish a session key with a server in an authenticated and anonymous way. As a very convenient solution for personal privacy protection, it has
Publikováno v:
Soft Computing. 22:2495-2506
Three-party authenticated key exchange (3PAKE) protocol allows two communication users to authenticate each other and to establish a secure common session key with the help of a trusted remote server. Recently, Farash and Attari propose an efficient
Publikováno v:
ACCENTS Transactions on Information Security. 2:62-72
Publikováno v:
Journal of the Korea Institute of Information Security and Cryptology. 26:1387-1399
Publikováno v:
ACM Transactions on Internet Technology. 16:1-20
Two-party password-authenticated key exchange (2PAKE) protocols provide a natural mechanism for secret key establishment in distributed applications, and they have been extensively studied in past decades. However, only a few efforts have been made s
Publikováno v:
Information Sciences. 369:184-187
Authenticated key agreement protocol is a useful primitive which allows two or more entities to securely establish a shared secret key for their communications over an insecure public network. Recently, Zhang proposed an efficient certificateless one
Autor:
Jikai Teng, Chuankun Wu
Publikováno v:
Chinese Journal of Electronics. 25:726-733
In wireless mobile networks, group members join and leave the group frequently, a dynamic group key agreement protocol is required to provide a group of users with a shared secret key to achieve cryptographic goal. Most of previous group key agreemen
Publikováno v:
Computer Networks. 101:42-62
We observed that Farash et?al.'s authentication protocol for WSN is susceptible to many security attacks.The protocol is also unable to preserve user anonymity.We designed an anonymity preserving authentication scheme for WSN.We analyze the security