Sciweavers

CSI
2010
232views more  CSI 2010»
13 years 11 months ago
Advanced smart card based password authentication protocol
Song [8] proposed very recently a password-based authentication and key establishment protocol using smart cards which attempts to solve some weaknesses found in a previous scheme...
Ronggong Song
CORR
2007
Springer
127views Education» more  CORR 2007»
14 years 13 days ago
Using decision problems in public key cryptography
There are several public key establishment protocols as well as complete public key cryptosystems based on allegedly hard problems from combinatorial (semi)group theory known by no...
Vladimir Shpilrain, Gabriel Zapata
IJNSEC
2006
94views more  IJNSEC 2006»
14 years 13 days ago
Attacks on An ISO/IEC 11770-2 Key Establishment Protocol
Two possible types of attack (a replay attack and a type attack) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770-2 are described and two solutions are...
Zhaohui Cheng, Richard Comley
WOWMOM
2005
ACM
165views Multimedia» more  WOWMOM 2005»
14 years 6 months ago
Hybrid Key Establishment for Multiphase Self-Organized Sensor Networks
Recent work on key establishment for sensor networks has shown that it is feasible to employ limited Elliptic Curve Cryptography in sensor networks through hybrid protocols. In th...
Panayiotis Kotzanikolaou, Emmanouil Magkos, Christ...
MOBIQUITOUS
2007
IEEE
14 years 6 months ago
Key Establishment Using Secure Distance Bounding Protocols
Key establishment is one of the major challenges in Wireless Personal Area Networks, as traditional security mechanisms often do not cope with the dynamic characteristics of wirel...
Dave Singelée, Bart Preneel