نتایج جستجو برای: key agreement protocol

تعداد نتایج: 929539  

Journal: :International Journal of Computer Applications 2013

Journal: :IJSN 2009
Sven Laur Sylvain Pasini

All classical authentication protocols are based on pre-shared authentic information such as long-term secret keys or a public key infrastructure. However, there are many practical settings, where participants can additionally employ authentic OutOf-Band (OOB) communication, e.g., manual message transfer. In this paper, we study the corresponding user-aided message authentication and key agreem...

2005
Shanyu Zheng Jim Alves-Foss Stephen S. Lee

A few group key protocols are analyzed, implemented and deployed, but the costs associated with them have been poorly understood. Their analysis of group key agreements performance is based on the cost of performing a single operation. In this paper we extend this analysis to examine the performance behavior of five group key protocols after execution of multiple operation. We report our experi...

2005
Jooyoung Lee Douglas R. Stinson

We revisit a key agreement scheme presented by Leighton and Micali [11], generalize the scheme, and present a new framework of tree-based key distribution pattern (TKDP). We presents a method of constructing TKDPs from cover-free families. We show the existence of TKDPs by probabilistic method. We can reduce the upper bounds on the minimum number of rows of (t, w, T )-TKDPs, which are obtained ...

Journal: :I. J. Network Security 2008
Kim-Kwang Raymond Choo

Despite the importance of proofs in assuring protocol implementers about the security properties of key establishment protocols, many protocol designers fail to provide any proof of security. Flaws detected long after the publication and/or implementation of protocols will erode the credibility of key establishment protocols. We examine the class of key agreement protocols (without proofs of se...

Journal: :European Transactions on Telecommunications 2011
Min-Shiang Hwang Song-Kong Chong Hsia-Hung Ou

In this paper, we propose a practical and secure authentication and key agreement scheme for Universal Mobile Telecommunications System (UMTS). The paper introduces a new requirement, “home network should be partially trusted in an authentication scheme” to the UMTS. The scheme integrates symmetric and public key cryptosystem. Issues such as kinds of ”subscriber identity/location confidential” ...

Journal: :CoRR 2006
M. Chowdhury

We show that two new key exchange protocols with security based on the triple decomposition problem may have security based on the MSCSP.

2001
Kwangjo Kim

We propose an authentication and key agreement protocol while preserving the anonymity of a mobile user in wireless mobile environments. When a mobile user and his visited network mutually authenticate each other, the anonymity of the user should be preserved. In order to provide user anonymity, we introduce new method of computing the temporary identity (TID) during the authentication process....

2013
Minha Park Yeog Kim Okyeon Yi

Many people demand more convenience and smarter service. Due to demand, smart devices have begun to take center stage in terms of portability and functionality in wireless environments, especially mobile communications. To provide secure service, authentication between networks and users’ devices is necessary with proper efficiency. In this paper, we propose an advanced authentication protocol ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید