Sciweavers

135 search results - page 9 / 27
» Authentication and Key Agreement Protocols Preserving Anonym...
Sort
View
SCN
2008
Springer
106views Communications» more  SCN 2008»
13 years 7 months ago
A bilateral remote user authentication scheme that preserves user anonymity
Smart card-based authentication is one of the most widely used and practical solutions to remote user authentication. Compared to other authentication schemes, our proposed scheme...
Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang
ICC
2007
IEEE
206views Communications» more  ICC 2007»
14 years 2 months ago
ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks
— In this paper, we present a novel anonymous secure routing protocol for mobile ad hoc networks (MANETs). The proposed protocol not only provides anonymity from all the intermed...
Xiaodong Lin, Rongxing Lu, Haojin Zhu, Pin-Han Ho,...
ASIAN
2006
Springer
126views Algorithms» more  ASIAN 2006»
13 years 11 months ago
Certificateless Authenticated Two-Party Key Agreement Protocols
Tarjei K. Mandt, Chik How Tan
CTRSA
2007
Springer
147views Cryptology» more  CTRSA 2007»
13 years 11 months ago
Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement
Privacy concerns in many aspects of electronic communication trigger the need to re-examine
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
IMA
1997
Springer
211views Cryptology» more  IMA 1997»
13 years 12 months ago
Key Agreement Protocols and Their Security Analysis
This paper proposes new protocols for two goals: authenticated key agreement and authenticated key agreement with key con rmation in the asymmetric public-key setting. A formalm...
Simon Blake-Wilson, Don Johnson, Alfred Menezes