Sciweavers

149 search results - page 4 / 30
» On the Performance of Group Key Agreement Protocols
Sort
View
CJ
2007
85views more  CJ 2007»
13 years 5 months ago
On The Security of a Group Key Agreement Protocol
In this paper we show that the group key agreement protocol proposed by Tseng suffers from a number of serious security vulnerabilities.
Qiang Tang
ACISP
2005
Springer
13 years 11 months ago
Dynamic Group Key Agreement in Tree-Based Setting
We present a provably secure tree based authenticated group key agreement protocol in dynamic scenario. Bilinear pairing and multi-signature are at the heart of our protocol. We p...
Ratna Dutta, Rana Barua
JCP
2007
122views more  JCP 2007»
13 years 5 months ago
Converting Group Key Agreement Protocol into Password-Based Setting - Case Study
Abstract— Converting a secure group key agreement protocol into password-based setting is not a trivial task. The security of a password-based scheme hinges on preventing diction...
Ratna Dutta
CSFW
2004
IEEE
13 years 9 months ago
Generic Insecurity of Cliques-Type Authenticated Group Key Agreement Protocols
The A-GDH.2 and SA-GDH.2 authenticated group key
Olivier Pereira, Jean-Jacques Quisquater
PERCOM
2007
ACM
14 years 5 months ago
A three round authenticated group key agreement protocol for ad hoc networks
Group Key Agreement (GKA) protocols enable the participants to derive a key based on each one's contribution over a public network without any central authority. They also pr...
Daniel Augot, Raghav Bhaskar, Valérie Issarny, Da...