Sciweavers

160 search results - page 8 / 32
» An Efficient Protocol for Authenticated Key Agreement
Sort
View
IJNSEC
2007
145views more  IJNSEC 2007»
13 years 7 months ago
Authenticated Group Key Agreement Protocols for Ad hoc Wireless Networks
The lack of fixed infrastructure, both physical and organizational, and the highly dynamic nature of ad hoc networks, presents a major challenge in providing secure, authenticate...
Ahmed Abdel-Hafez, Ali Miri, Luis Orozco-Barbosa
ASIAN
2006
Springer
126views Algorithms» more  ASIAN 2006»
13 years 11 months ago
Certificateless Authenticated Two-Party Key Agreement Protocols
Tarjei K. Mandt, Chik How Tan
CTRSA
2007
Springer
147views Cryptology» more  CTRSA 2007»
13 years 11 months ago
Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement
Privacy concerns in many aspects of electronic communication trigger the need to re-examine
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
IMA
1997
Springer
211views Cryptology» more  IMA 1997»
13 years 11 months ago
Key Agreement Protocols and Their Security Analysis
This paper proposes new protocols for two goals: authenticated key agreement and authenticated key agreement with key con rmation in the asymmetric public-key setting. A formalm...
Simon Blake-Wilson, Don Johnson, Alfred Menezes
AMC
2005
172views more  AMC 2005»
13 years 7 months ago
An efficient nonce-based authentication scheme with key agreement
In this paper, we propose a cost effective mutual authentication scheme with key agreement using smart cards. Our scheme is motivated by the scheme design in two articles publishe...
Yen-Cheng Chen, Lo-Yao Yeh