نتایج جستجو برای: key agreement protocol

تعداد نتایج: 929539  

1996
Paul F. Syverson Paul C. van Oorschot

We present a logic for analyzing cryptographic protocols. This logic is based on a uniication of four of its predecessors in the BAN family of logics, namely those given in GNY90], AT91], vO93b], and BAN itself BAN89]. The logic herein captures the desirable features of its predecessors and more; nonetheless, as a logic it is relatively simple and simple to use. We also present a model-theoreti...

2004
Kui Ren Hyunrok Lee Kwangjo Kim Taewhan Yoo

Group key management presents a fundamental challenge in secure dynamic group communications. In this paper, we propose an efficient group authenticated key agreement protocol (EGAKA), which is designed to be fully distributed and fault-tolerant, provides efficient dynamic group membership management, mutual authentication among group members and is secure against both passive and active attack...

2007
Stanislaw Jarecki Jihye Kim Gene Tsudik

Privacy concerns in many aspects of electronic communication trigger the need to re-examine – with privacy in mind – familiar security services, such as authentication and key agreement. An Affiliation-Hiding Group Key Agreement (AH-AGKA) protocol (also known as Group Secret Handshake) allows a set of participants, each with a certificate issued by the same authority, to establish a common auth...

Journal: :Inf. Sci. 2010
Lei Zhang Futai Zhang Qianhong Wu Josep Domingo-Ferrer

Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to prevent active attacks. AKA can be achieved using a public key infrastructure (PKI) or identity-based cryptography. However, the former suffers from a heavy certificate management burden while the latter is subject to the s...

Journal: :International Journal of Computer Applications 2013

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید