نتایج جستجو برای: key agreement protocol

تعداد نتایج: 929539  

Journal: :Computers & Security 2006
Wen-Gong Shieh Jian-Min Wang

A smart card based scheme is very practical to authenticate remote users. In 2004, Juang [Juang WS. Efficient password authenticated key agreement using smart cards. Computers and Security 2004;23:167–73] proposed a mutual authentication scheme using smart cards. The advantages in the scheme include freely chosen passwords, no verification tables, low communication and computation cost, and ses...

2007
Jongpil Kim Sungik Jun

Authentication is the most important issue to control the home networks remotely. In this paper, a strong authentication and key agreement method for a smart home network system is presented. The proposed scheme uses a smart card which stores private information and performs cryptic operations. It also uses a modified 3GPP security system that is suitable for the home network. Our scheme provid...

2007
Taenam Cho Jin-Hee Han Sung-Ik Jeon

3GPP makes efforts to enable usage of 3GPP system functionalities such as SIP calls between mobile terminals and 3GPP systems via the WLAN and to utilize 3GPP system functionalities to complement the functionalities such as charging means, authentication, authorization, and accounting functions available in the WLAN. And an interworking framework to integrate the services of 3G, WLAN and WiBro ...

Journal: :I. J. Network Security 2018
Cheng Guo Chin-Chen Chang Shih-Chang Chang

Mobile user authentication and key agreement for wireless networks is an important security priority. In recent years, several user authentication and key agreement protocols with smart cards for wireless communications have been proposed. In 2011, Xu et al. proposed an efficient mutual authentication and key agreement protocol with an anonymity property. Although the protocol of Xu et al. has ...

Journal: :JCP 2012
Chunguang Ma Jiuru Wang Peng Wu Hua Zhang

In order to integrate identity authentication and key agreement, a novel academic thought is set out, a fasting one-way accumulator is constructed, and a fasting one-way accumulator-based key management protocol is put forward for Heterogeneous Sensor Networks (HSNs). The experiments and analysis show that the proposed protocol not only implements identity authentication function, but has high ...

2012
Yun-Hsin Chuang Yuh-Min Tseng Chin-Laung Lei

Global mobility networks provide effective global roaming services for personal communication users. Through the universal roaming technology, legitimate mobile users can enjoy the ubiquitous services. Mutual authentication and key agreement between mobile users and roaming servers is the primary security issue of many commercial mobile networks. For personal privacy, it becomes an important is...

2003
Hyoung-Mok Lee Eun-Kyung Ryu Kee-Won Kim Jae-Min Lee Kee-Young Yoo

In this paper, we propose a robust authenticated key agreement protocol in which two communication parties exchange a secret session key and authenticate each other. The protocol can be considered as an improvement of simple authenticated key agreement algorithm (SAKA). However, our protocol is more significant in that it addresses the problem of the off-line password guessing attack.

2017
Mohammad Vahidalizadehdizaj Avery Leider

Security in group communication has been a significant field of research for decades. Because of the emerging technologies like cloud computing, mobile computing, ad-hoc networks, and wireless sensor networks, researchers are considering high group dynamics in communication security. Group key agreement protocol is for providing enough security for the group communication. Group key agreement p...

2014
Ping Zhen Geng Zhao Lequan Min Xiaodong Li

—Many key agreement protocols based on chaotic maps have been proposed to guarantee secure communications in the network. Recently, Wang et al. proposed a new key agreement protocol based on chaotic maps. But some issues exist in this protocol, such as anonymity, key distribution and management, and password problems. In order to improve the performance of Wang et al.’s protocol, this paper pr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید