نتایج جستجو برای: key agreement protocol

تعداد نتایج: 929539  

Journal: :International Journal of Engineering and Technology 2013

2013
Jyoti Kataria Abhay Bansal

With the expansion of mobile communication network, incredible changes are taking place in the field of mobile technologies, as requirements are increasing day by day for mobile data services along with them security concerns are also expanding. This paper focuses on the architecture of GSM and UMTS along with Authentication and Key Agreement protocol description, which shows the encryption pro...

2015
M. Prasad R. Manoharan

The authentication and key agreement (AKA) protocol for Long Term Evolution-Advanced (LTE-A) which is proposed to solve the vulnerabilities found in previous communication systems such as 2G and 3G systems. They still contain the vulnerabilities like redirection and man-in-the-middle attack. They gave way to the eavesdroppers to utilize and misuse the subscribers resources and make the communic...

2004
Colin Boyd Wenbo Mao Kenneth G. Paterson

A family of authenticators based on static shared keys is identified and proven secure. The authenticators can be used in a variety of settings, including identity-based ones. Application of the authenticators to Diffie-Hellman variants in appropriate groups leads to authenticated key agreement protocols which have attractive properties in comparison with other proven-secure protocols. We explo...

2004
Yvonne Hitchcock Colin Boyd Juan Manuel González Nieto

A definition of secure multi-party key exchange in the Canetti-Krawczyk proof model is proposed, followed by a proof of the security of the Joux tripartite key agreement protocol according to that definition. The Joux protocol is then combined with two authentication mechanisms to produce a variety of provably secure key agreement protocols. The properties and efficiency of the Joux based proto...

2011
Mourad Amad Djamil Aïssani Ahmed Meddahi Mustapha Saadi

Secure and efficient communication among a set of mobile nodes is one of the most important aspect in P2P wireless networks. Security of various group-oriented applications requires a group secret shared between all participants. Several group key protocols have been presented in the literature to enable secrecy of communication among dynamic group of participants. However, most of them suffer ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید