๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Security weaknesses of authenticated key agreement protocols

โœ Scribed by Peter Nose


Book ID
108154766
Publisher
Elsevier Science
Year
2011
Tongue
English
Weight
213 KB
Volume
111
Category
Article
ISSN
0020-0190

No coin nor oath required. For personal study only.


๐Ÿ“œ SIMILAR VOLUMES


Strongly secure identity-based authentic
โœ Liang Ni; Gongliang Chen; Jianhua Li; Yanyan Hao ๐Ÿ“‚ Article ๐Ÿ“… 2011 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 272 KB

In this paper, we present a strongly secure identity-based (ID-based) two-party authenticated key agreement (AKA) protocol, which captures all basic desirable security properties including master key forward secrecy, ephemeral secrets reveal resistance and so on, and is provably secure in the extend

Secure authenticated group key agreement
โœ Chan Yeob Yeun; Kyusuk Han; Duc Liem Vo; Kwangjo Kim ๐Ÿ“‚ Article ๐Ÿ“… 2008 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 352 KB

Authenticated group key agreement a b s t r a c t Due to dynamic and infrastructure-less nature of Mobile Ad hoc Network (MANET) environment, there exist number of threats as mobile devices and nodes could freely move around in MANET such as eavesdropping of communications channels, modification of