Mutual-anonymity and Authentication Key Agreement Protocol

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Authentication and Key Agreement Protocols Preserving Anonymity

Anonymity is a very important security feature in addition to authentication and key agreement features in communication protocols. In this paper, we propose two authentication and key agreement (AKA) protocols: the AKA protocol with user anonymity (UAP) and the AKA protocol with user and server anonymity (USAP). The proposed protocols have the following advantages: first of all, they preserve ...

متن کامل

Efficient remote mutual authentication and key agreement

A smart card based scheme is very practical to authenticate remote users. In 2004, Juang [Juang WS. Efficient password authenticated key agreement using smart cards. Computers and Security 2004;23:167–73] proposed a mutual authentication scheme using smart cards. The advantages in the scheme include freely chosen passwords, no verification tables, low communication and computation cost, and ses...

متن کامل

An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks

WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate use...

متن کامل

Efficient Mutual Authentication and Key Agreement with User Anonymity for Roaming Services in Global Mobility Networks

Global mobility networks provide effective global roaming services for personal communication users. Through the universal roaming technology, legitimate mobile users can enjoy the ubiquitous services. Mutual authentication and key agreement between mobile users and roaming servers is the primary security issue of many commercial mobile networks. For personal privacy, it becomes an important is...

متن کامل

Ironwood Meta Key Agreement and Authentication Protocol

Number theoretic public key solutions are subject to various quantum attacks making them less attractive for longer term use. Certain group theoretic constructs show promise in providing quantum-resistant cryptographic primitives. We introduce a new protocol called a Meta Key Agreement and Authentication Protocol (MKAAP) that has some characteristics of a public key solution and some of a share...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Research Journal of Information Technology

سال: 2013

ISSN: 2041-3106,2041-3114

DOI: 10.19026/rjit.5.5791