نتایج جستجو برای: key agreement protocol

تعداد نتایج: 929539  

Journal: :Int. Journal of Network Management 2009
Hsia-Hung Ou Iuon-Chang Lin Min-Shiang Hwang Jinn-ke Jan

Mobile communication is definitely one of the major high-technology applications that offer present-day people a modern life of appropriate convenience. In recent years, the third generation cell-phone system has approached maturity. The Universal Mobile Telecommunication System (UMTS) is currently the most widely used system around the world. The 3rd Generation Partnership Project is equipped ...

2006
Shanyu Zheng David Manz Yuzhe Chen

Several group key protocols have been presented in the literature to enable secrecy of communication among dynamic groups of participants. However, there is a lack of consistency in the literature in terms of operations supported and performance metrics of the various protocols. This makes it difficult for designers to choose the best protocol for their specific applications. To alleviate this ...

Journal: :IACR Cryptology ePrint Archive 2005
Anish Mathuria Vipul Jain

A class of efficient key agreement protocols proposed by Boyd is examined. An attack is demonstrated on a round-optimal example protocol of this class, and a simple countermeasure is suggested. The whole class is known to be vulnerable to an attack proposed by Bauer, Berson and Feiertag. A new class of key agreement protocols without this vulnerability but having the same advantages in efficien...

Journal: :IACR Cryptology ePrint Archive 2010
Konstantinos Chalkias Foteini Baldimtsi Dimitrios Hristu-Varsakelis Spyros T. Halkidis George Stephanides

We discuss a recently proposed one-pass authenticated key agreement protocol, by Mohammad, Chen, Hsu and Lo, which was “derived” from their correponding two-pass version and claimed to be secure. We show that this is not the case by demonstrating a number of vulnerabilities.

Journal: :IACR Cryptology ePrint Archive 2006
Chunbo Ma Jun Ao Jianhua Li

As a useful means of safeguarding privacy of communications, deniable authentication has received much attention. A Chameleon-based deniable authenticated key agreement protocol is presented in this paper. The protocol has following properties. Any one of the two participants can’t present a digital proof to convince a third party that a claimed agreement has really taken place. Once a forgery ...

2008
Eun-Jun Yoon Kee-Young Yoo

Due to the very limited computing resource, storing space and electric power supply of tag, it is a great challenge for us to design a practical RFID protocol which is security, efficient and can be used in the low-cost tag. In 2007, He et al. proposed an authentication and key agreement protocol which is used in the process of communication between the low-cost tag and reader. They also proved...

Journal: :DEStech Transactions on Computer Science and Engineering 2017

Journal: :Communications of the Korean Mathematical Society 2003

Journal: :International Journal of Theoretical Physics 2021

Utilizing the advantage of quantum entanglement swapping, a multi-party key agreement protocol with authentication is proposed. In this protocol, semi-trusted third party introduced, who prepares Bell states, and sends one particle to multiple participants respectively. After that can share Greenberger-Horne-Zeilinger state by swapping. Finally, these measure particles in their hands obtain an ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید