Sciweavers

23 search results - page 1 / 5
» Impersonation Attack on a Strong ID-Based Key Distribution
Sort
View
IEICET
2008
66views more  IEICET 2008»
13 years 4 months ago
Impersonation Attack on a Strong ID-Based Key Distribution
Jung Yeon Hwang, Jongin Lim, Dong Hoon Lee
INFORMATICALT
2002
118views more  INFORMATICALT 2002»
13 years 4 months ago
Cryptanalysis and Improvement of Key Distribution System for VSAT Satellite Communications
Recently, Park and Lim (1998) proposed two key distribution systems for secure VSAT satellite communications. One provides indirect authentication, and another scheme enables that ...
Yuh-Min Tseng
EUROPKI
2006
Springer
13 years 8 months ago
On the Resilience of Key Agreement Protocols to Key Compromise Impersonation
Abstract. Key agreement protocols are a fundamental building block for ensuring authenticated and private communications between two parties over an insecure network. This paper fo...
Maurizio Adriano Strangio
PKC
2012
Springer
255views Cryptology» more  PKC 2012»
11 years 7 months ago
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
Abstract. An unresolved problem in research on authenticated key exchange (AKE) is to construct a secure protocol against advanced attacks such as key compromise impersonation and ...
Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Ka...
IPCCC
2005
IEEE
13 years 10 months ago
A key distribution scheme for double authentication in link state routing protocol
The Double Authentication (DA) scheme presented in [1] is designed to provide security against impersonation attack to link state routing protocol at a lower computational cost as...
D. Huang, A. Sinha, D. Medhi