Sciweavers

121 search results - page 4 / 25
» An efficient nonce-based authentication scheme with key agre...
Sort
View
87
Voted
IJNSEC
2008
120views more  IJNSEC 2008»
14 years 10 months ago
Efficient Identity-based Authenticated Key Agreement Protocol with PKG Forward Secrecy
For an identity-based authenticated key agreement (IDAK) protocol, PKG forward secrecy is the strongest notion of forward secrecy, which is about the security of previously establ...
Shengbao Wang, Zhenfu Cao, Feng Cao
111
Voted
IJNSEC
2008
145views more  IJNSEC 2008»
14 years 10 months ago
Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing
Most of the current security architectures for grid systems use conventional public key infrastructure (PKI) to authenticate grid members and to secure resource allocation to thes...
Shengbao Wang, Zhenfu Cao, Haiyong Bao
FC
2010
Springer
205views Cryptology» more  FC 2010»
15 years 2 months ago
On Robust Key Agreement Based on Public Key Authentication
—This paper discusses public-key authenticated key agreement protocols. First, we critically analyze several authenticated key agreement protocols and uncover various theoretical...
Feng Hao
COMPSEC
2006
78views more  COMPSEC 2006»
14 years 10 months ago
Efficient remote mutual authentication and key agreement
Wen-Gong Shieh, Jian-Min Wang
69
Voted
CORR
2010
Springer
59views Education» more  CORR 2010»
14 years 10 months ago
Efficient Password-Typed Key Agreement Scheme
In this paper, we will study Lee, Kim and Yoo, a verifier password typed key agreement scheme and demonstrate that the scheme is not secure. Then, the authors will propose an enha...
Sattar J. Aboud