نتایج جستجو برای: key agreement protocol
تعداد نتایج: 929539 فیلتر نتایج به سال:
With the expansion of mobile communication network, incredible changes are taking place in the field of mobile technologies, as requirements are increasing day by day for mobile data services along with them security concerns are also expanding. This paper focuses on the architecture of GSM and UMTS along with Authentication and Key Agreement protocol description, which shows the encryption pro...
The authentication and key agreement (AKA) protocol for Long Term Evolution-Advanced (LTE-A) which is proposed to solve the vulnerabilities found in previous communication systems such as 2G and 3G systems. They still contain the vulnerabilities like redirection and man-in-the-middle attack. They gave way to the eavesdroppers to utilize and misuse the subscribers resources and make the communic...
A family of authenticators based on static shared keys is identified and proven secure. The authenticators can be used in a variety of settings, including identity-based ones. Application of the authenticators to Diffie-Hellman variants in appropriate groups leads to authenticated key agreement protocols which have attractive properties in comparison with other proven-secure protocols. We explo...
A definition of secure multi-party key exchange in the Canetti-Krawczyk proof model is proposed, followed by a proof of the security of the Joux tripartite key agreement protocol according to that definition. The Joux protocol is then combined with two authentication mechanisms to produce a variety of provably secure key agreement protocols. The properties and efficiency of the Joux based proto...
Secure and efficient communication among a set of mobile nodes is one of the most important aspect in P2P wireless networks. Security of various group-oriented applications requires a group secret shared between all participants. Several group key protocols have been presented in the literature to enable secrecy of communication among dynamic group of participants. However, most of them suffer ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید