Sciweavers

40 search results - page 4 / 8
» Identity-Based Authenticated Asymmetric Group Key Agreement ...
Sort
View
IJNSEC
2007
145views more  IJNSEC 2007»
13 years 8 months ago
Authenticated Group Key Agreement Protocols for Ad hoc Wireless Networks
The lack of fixed infrastructure, both physical and organizational, and the highly dynamic nature of ad hoc networks, presents a major challenge in providing secure, authenticate...
Ahmed Abdel-Hafez, Ali Miri, Luis Orozco-Barbosa
APSCC
2007
IEEE
14 years 2 months ago
ID-Based Key Agreement for Dynamic Peer Groups in Mobile Computing Environments
In order to secure communications for dynamic peer groups in mobile computing environments, key agreement protocols are required. In this paper, we propose a new key agreement pro...
Raylin Tso, Xun Yi, Eiji Okamoto
MDAI
2005
Springer
14 years 2 months ago
One-Way and Two-Party Authenticated ID-Based Key Agreement Protocols Using Pairing
Cryptography is the ancient science of encrypting messages so that only the sender and receiver can recover them. To achieve this goal, an agreed key between the sender and receive...
Takeshi Okamoto, Raylin Tso, Eiji Okamoto
EUROPKI
2006
Springer
14 years 7 days ago
On the Resilience of Key Agreement Protocols to Key Compromise Impersonation
Abstract. Key agreement protocols are a fundamental building block for ensuring authenticated and private communications between two parties over an insecure network. This paper fo...
Maurizio Adriano Strangio
ICICS
2005
Springer
14 years 2 months ago
Security Properties of Two Authenticated Conference Key Agreement Protocols
In this paper we analyse the security of two authenticated group key agreement schemes based on the group key agreement protocol of Burmester and Desmedt. One scheme was proposed ...
Qiang Tang, Chris J. Mitchell