• No results found

Authenticated key agreement

Attacks and Solutions of an Authenticated Key Agreement Protocol Based on NFC for Mobile Payment

Attacks and Solutions of an Authenticated Key Agreement Protocol Based on NFC for Mobile Payment

... an authenticated key agreement protocol to authenticate the mobile user and the merchant that ensures the confidentiality and integrity of the ...three-party authenticated key ...

8

Weakness  of  Several  Identity-based  Tripartite  Authenticated  Key  Agreement  Protocols

Weakness of Several Identity-based Tripartite Authenticated Key Agreement Protocols

... of key agreement is to generalize the two-party key agreement into multi-party setting, amongst which the tripartite key agreement receives much ...tripartite key ...

8

An energy efficient authenticated key agreement protocol for SIP-based green VoIP networks

An energy efficient authenticated key agreement protocol for SIP-based green VoIP networks

... In order to eliminate the password or verification tables, Yeh et al. (2013) adopted the smartcard to construct an authentication protocol based on ECC for SIP. However their protocol involved the time synchronization ...

23

Design of a Secure Mutually Authenticated Key-Agreement Protocol for Multi-server Architecture

Design of a Secure Mutually Authenticated Key-Agreement Protocol for Multi-server Architecture

... [4] Kim, H., Jeon, W., Lee, K., Lee, Y., & Won, D. (2012). Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme. Proceedings of International ...

10

On the Security of a Three Party Authenticated Key Agreement Scheme based on Chaotic Maps

On the Security of a Three Party Authenticated Key Agreement Scheme based on Chaotic Maps

... There are many three-party-authenticated key agreement schemes in the literature which apparently seem to work but they have been shown to be insecure. Nevertheless, the very recent Lee et al.’s ...

6

Cryptanalysis  of  pairing-free  certificateless  authenticated  key  agreement  protocol

Cryptanalysis of pairing-free certificateless authenticated key agreement protocol

... key agreement protocol, International Journal of Communication Systems, 25(2), ...certificateless authenticated key agreement protocol and demonstrated that their protocol is provable ...

9

Cryptanalysis  of  Three  Certificate-Based  Authenticated  Key  Agreement  Protocols   and  a  Secure  Construction

Cryptanalysis of Three Certificate-Based Authenticated Key Agreement Protocols and a Secure Construction

... public key cryptography while eliminating the key escrow problem in identity-based ...three authenticated key agreement (AKA) protocols in the setting of certificate-based cryptography ...

19

A lightweight privacy preserving authenticated key agreement protocol for SIP-based VoIP

A lightweight privacy preserving authenticated key agreement protocol for SIP-based VoIP

... efficient authenticated key agreement protocol plays an essential role in protecting private and valuable information over audio communications in SIP-based ...several authenticated key ...

40

Comparative Study of Tripartite Identity-Based Authenticated Key Agreement Protocols

Comparative Study of Tripartite Identity-Based Authenticated Key Agreement Protocols

... public key is an easily calculated func- tion of her identity ...private key is calculated by a trusted authority referred to as Key Generation Center ...identity-based key construction based ...

10

Cryptanalysis and improvement of a Multi-Server Authenticated Key Agreement by Chen and Lee’s Scheme

Cryptanalysis and improvement of a Multi-Server Authenticated Key Agreement by Chen and Lee’s Scheme

... user authenticated key agreement for MSA ...authentication agreement, and onwards demonstrated an enhanced ...session key and ...session key establishment in our protocol is ...

16

New Authenticated Key Agreement Protocols

New Authenticated Key Agreement Protocols

... In key agreement protocols, two or more entities agree on a session key to be used later to assure the confidentiality of the communication between ...of authenticated key ...

6

An Efficient Certificate-Based Authenticated Key Agreement Protocol without Bilinear Pairing

An Efficient Certificate-Based Authenticated Key Agreement Protocol without Bilinear Pairing

... An authenticated key agreement (AKA) protocol is extremely essential to secure communications over insecure public ...session key in present of the malicious ...the key-escrow problem ...

15

An Improved Certificate less Authenticated Key Agreement Protocol

An Improved Certificate less Authenticated Key Agreement Protocol

... user key leakage and KCI attack caused by leaked temporary key in the literature ...private key, he can calculate user’s private key by the correlation expression and implement KCI ...

8

Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme

Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme

... session key used to encrypt the packets can ensure the confidentiality of EMR/HER, many authenticated key agreement schemes [9-13] have been developed to protect medical records security and ...

39

Robust and efficient password authenticated key agreement with user anonymity for session initiation protocol-based communications

Robust and efficient password authenticated key agreement with user anonymity for session initiation protocol-based communications

... suitable key agreement protocol plays an essential role in protecting the communications over open channels among users using Voice over Internet Protocol ...password authenticated key ...

26

Authenticated Key Agreement Protocols:  A Comparative Study

Authenticated Key Agreement Protocols: A Comparative Study

... Authenticated Key Agreement (AKA) Protocol share widely used for any secure communication systems such as electronic commerce, wired lines, wireless and other Internet applications ...session ...

9

Cryptanalysis and improvement of password-authenticated key agreement for session initiation protocol using smart cards

Cryptanalysis and improvement of password-authenticated key agreement for session initiation protocol using smart cards

... password authenticated key agreement protocol for SIP by using smart cards to protect the VoIP communications between ...authentication key agreement protocol for SIP, which overcame ...

16

An Enhanced Authenticated Key Agreement for Session Initiation Protocol

An Enhanced Authenticated Key Agreement for Session Initiation Protocol

... Xie's authenticated key agreement protocol session initiation ...private key can easily impersonate the server to the users and share secret keys with ...

10

Authenticated Key Agreement Based on NFC for Mobile Payment

Authenticated Key Agreement Based on NFC for Mobile Payment

... Abstract: Mobile payment is being adopted all over the world in different ways. Along with the increased convenience at the point of sale, mobile payment acceptance can also bring new risks to the security of cardholder ...

8

An  Efficient  Multiple  PKG  Compatible  Identity  Based  Authenticated  Key  Agreement  protocol

An Efficient Multiple PKG Compatible Identity Based Authenticated Key Agreement protocol

... the key needs to be established. Identity Based Key Agreement thus have their own relative merits over its Public Key version but is bogged down by a severely crippling cap on the number of ...

15

Show all 10000 documents...

Related subjects