Sciweavers

65 search results - page 11 / 13
» Efficient Client-to-Client Password Authenticated Key Exchan...
Sort
View
ICC
2007
IEEE
119views Communications» more  ICC 2007»
14 years 2 months ago
A Secure Authentication Policy for UMTS and WLAN Interworking
—We propose a security authentication policy, Dynamic Session Key Policy (DSKP), for a secure handoff between the UMTS and IEEE 802.11 WLAN. This policy is founded and improved f...
Yen-Chieh Ouyang, Chang-Bu Jang, Hung-Ta Chen
IJNSEC
2008
146views more  IJNSEC 2008»
13 years 8 months ago
Formal Protocol Design of ESIKE Based on Authentication Tests
In this paper, we first present a concrete formal protocol design approach, which is based on authentication tests, to create an Efficient and Secure Internet Key Exchange (ESIKE)...
Rui Jiang, Aiqun Hu, Jianhua Li
CANS
2006
Springer
83views Cryptology» more  CANS 2006»
14 years 8 days ago
Efficient Mutual Data Authentication Using Manually Authenticated Strings
Abstract. Solutions for an easy and secure setup of a wireless connection between two devices are urgently needed for WLAN, Wireless USB, Bluetooth and similar standards for short ...
Sven Laur, Kaisa Nyberg
CCS
2003
ACM
14 years 6 days ago
LEAP: efficient security mechanisms for large-scale distributed sensor networks
We describe LEAP (Localized Encryption and Authentication Protocol), a key management protocol for sensor networks that is designed to support in-network processing, while at the ...
Sencun Zhu, Sanjeev Setia, Sushil Jajodia
IEEECIT
2010
IEEE
13 years 6 months ago
On Small Subgroup Non-confinement Attack
The small subgroup confinement attack works by confining cryptographic operations within a small subgroup, in which exhaustive search is feasible. This attack is overt and hence ca...
Feng Hao