Sciweavers

291 search results - page 14 / 59
» Key Agreement Protocols and Their Security Analysis
Sort
View
SCN
2010
Springer
138views Communications» more  SCN 2010»
13 years 7 months ago
A Security Enhancement and Proof for Authentication and Key Agreement (AKA)
In this work, we consider Authentication and Key Agreement (AKA), a popular client-server Key Exchange (KE) protocol, commonly used in wireless standards (e.g., UMTS), and widely c...
Vladimir Kolesnikov
IJNSEC
2007
145views more  IJNSEC 2007»
13 years 8 months ago
Authenticated Group Key Agreement Protocols for Ad hoc Wireless Networks
The lack of fixed infrastructure, both physical and organizational, and the highly dynamic nature of ad hoc networks, presents a major challenge in providing secure, authenticate...
Ahmed Abdel-Hafez, Ali Miri, Luis Orozco-Barbosa
STOC
2005
ACM
110views Algorithms» more  STOC 2005»
14 years 9 months ago
Key agreement from weak bit agreement
Assume that Alice and Bob, given an authentic channel, have a protocol where they end up with a bit SA and SB, respectively, such that with probability 1+ 2 these bits are equal. ...
Thomas Holenstein
ICNP
2002
IEEE
14 years 1 months ago
Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups
We consider several distributed collaborative key agreement protocols for dynamic peer groups. This problem has several important characteristics which make it different from trad...
Patrick P. C. Lee, John C. S. Lui, David K. Y. Yau