Sciweavers

135 search results - page 9 / 27
» Authentication and Key Agreement Protocols Preserving Anonym...
Sort
View
76
Voted
SCN
2008
Springer
106views Communications» more  SCN 2008»
14 years 9 months ago
A bilateral remote user authentication scheme that preserves user anonymity
Smart card-based authentication is one of the most widely used and practical solutions to remote user authentication. Compared to other authentication schemes, our proposed scheme...
Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang
ICC
2007
IEEE
206views Communications» more  ICC 2007»
15 years 3 months ago
ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks
— In this paper, we present a novel anonymous secure routing protocol for mobile ad hoc networks (MANETs). The proposed protocol not only provides anonymity from all the intermed...
Xiaodong Lin, Rongxing Lu, Haojin Zhu, Pin-Han Ho,...
ASIAN
2006
Springer
126views Algorithms» more  ASIAN 2006»
15 years 1 months ago
Certificateless Authenticated Two-Party Key Agreement Protocols
Tarjei K. Mandt, Chik How Tan
CTRSA
2007
Springer
147views Cryptology» more  CTRSA 2007»
15 years 1 months ago
Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement
Privacy concerns in many aspects of electronic communication trigger the need to re-examine
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
87
Voted
IMA
1997
Springer
211views Cryptology» more  IMA 1997»
15 years 1 months ago
Key Agreement Protocols and Their Security Analysis
This paper proposes new protocols for two goals: authenticated key agreement and authenticated key agreement with key con rmation in the asymmetric public-key setting. A formalm...
Simon Blake-Wilson, Don Johnson, Alfred Menezes