Sciweavers

138 search results - page 7 / 28
» One-Round Protocols for Two-Party Authenticated Key Exchange
Sort
View
ICC
2007
IEEE
206views Communications» more  ICC 2007»
14 years 1 months ago
ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks
— In this paper, we present a novel anonymous secure routing protocol for mobile ad hoc networks (MANETs). The proposed protocol not only provides anonymity from all the intermed...
Xiaodong Lin, Rongxing Lu, Haojin Zhu, Pin-Han Ho,...
CCS
2009
ACM
14 years 8 months ago
An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem
In this paper, we present a new ID-based two-party authenticated key exchange (AKE) protocol, which makes use of a new technique called twin Diffie-Hellman problem proposed by Cas...
Hai Huang, Zhenfu Cao
EUROPKI
2006
Springer
13 years 11 months ago
On the Resilience of Key Agreement Protocols to Key Compromise Impersonation
Abstract. Key agreement protocols are a fundamental building block for ensuring authenticated and private communications between two parties over an insecure network. This paper fo...
Maurizio Adriano Strangio
CEE
2010
66views more  CEE 2010»
13 years 7 months ago
Enhancements of authenticated multiple key exchange protocol based on bilinear pairings
Duc-Liem Vo, Hyunrok Lee, Chan-Yeob Yeun, Kwangjo ...