An Authenticated Key Exchange Mechanism Using One-Time Shared Key (original) (raw)

A New Authenticated Key Agreement Protocol

AbdAllah A . AlHabshy

New Technologies, Mobility and Security

View PDFchevron_right

Threshold Password-Authenticated Key Exchange

Markus Jakobsson

Journal of Cryptology, 2005

View PDFchevron_right

A Comparison Study on Key Exchange-Authentication protocol

Sin-Ban Ho

International Journal of Computer Applications, 2010

View PDFchevron_right

Symmetric key-based authenticated encryption protocol

Sanjay Singh

Information Security Journal: A Global Perspective, 2019

View PDFchevron_right

A Review Based Study of Key Exchange Algorithms

akhil kaushik

View PDFchevron_right

Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment

Marimuthu Karuppiah

Mobile Networks and Applications, 2018

View PDFchevron_right

Efficient identity-based authenticated key agreement protocol from pairings

YOUNGJU CHOIE

Applied Mathematics and Computation, 2005

View PDFchevron_right

Robust Authentication and Session Key Agreement Protocol for Satellite Communications

somayeh soltani

Computers, Materials & Continua

View PDFchevron_right

A Provably Secure One-Pass Two-Party Key Establishment Protocol

Spyros Halkidis

Lecture Notes in Computer Science

View PDFchevron_right

Development of IoT based Key Finder

Sayanth Sudheer

Proceedings of International Conference on Artificial Life and Robotics

View PDFchevron_right

xDAuth

Kamran Khan

Proceedings of the 16th ACM symposium on Access control models and technologies, 2011

View PDFchevron_right

A class of authentication codes with secrecy

elif kurtaran ozbudak

Designs, Codes and Cryptography, 2010

View PDFchevron_right

Secure Key Exchange Against Man-in-the-Middle Attack: Modified Diffie-Hellman Protocol

Abdelkader Laouid

Jurnal Ilmiah Teknik Elektro Komputer dan Informatika, 2021

View PDFchevron_right

Self-organized key management with trusted certificate exchange in MANET

saju john

Ain Shams Engineering Journal, 2015

View PDFchevron_right

A pairing‐free certificateless authenticated key agreement protocol

Dr Sahadeo Padhye

International Journal of Communication …, 2012

View PDFchevron_right

Vulnerability of two multiple-key agreement protocols

mohammad sabzinejad Farash

Computers & Electrical Engineering, 2011

View PDFchevron_right

Password-authenticated group key agreement with adaptive security and contributiveness

D. Catalano

2009

View PDFchevron_right

Survey and Taxonomy of Key Management Protocols for Wired and Wireless Networks

Alok Aggarwal

International Journal of Network Security & Its Applications, 2012

View PDFchevron_right

Novel one hop virtual group shared key management in mobile ad hoc networks

saju john

2012 12th International Conference on Intelligent Systems Design and Applications (ISDA), 2012

View PDFchevron_right

Developing a Security Typed Java Servlet

Doaa Salem

2008 The Fourth International Conference on Information Assurance and Security, 2008

View PDFchevron_right

Based Based Public key Cryptosystem based on the Double Public key Cryptosystem based on the Double Public key Cryptosystem based on the Double Public key Cryptosystem based on the Double

DR SHYAM SUNDAR AGRAWAL

2010

View PDFchevron_right

Hierarchical key establishment protocols based on secure keyed one-way hash functions

Sheng-De Wang

Proceedings Twelfth International Conference on Information Networking (ICOIN-12), 1998

View PDFchevron_right

Principles and Practices of Network Security

Dr Ihtiram Raza Khan

Zenodo (CERN European Organization for Nuclear Research), 2023

View PDFchevron_right

Key Exchange Protocol Using Matrix Algebras and Its Analysis

Kil-Chan Ha

Journal of the Korean Mathematical Society, 2005

View PDFchevron_right

An advanced policy based authorisation infrastructure

Kaniz Fatema

Proceedings of the 5th ACM workshop on Digital identity management, 2009

View PDFchevron_right

Kandregulaetal2024KMF

Mahesh Thakkar

View PDFchevron_right

Provable Security for PKI Schemes

Amir Herzberg

IACR Cryptology ePrint Archive, 2019

View PDFchevron_right

A Secure and Light Weight Authentication Service in Hadoop using One Time Pad

Chandra Sekhar Reddy

Procedia Computer Science, 2015

View PDFchevron_right

Aa679f9c3e

John Kuyokwa

View PDFchevron_right

Introduction to the issue

Imelda Katherine Brady

Journal of Public Affairs Education, 2018

View PDFchevron_right

Extension of Kerberos with X.509 and Integration of Elliptic Curve Cryptography in Authentication

murat akkaya

International Journal of Communications, Network and System Sciences, 2016

View PDFchevron_right

Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead

Hugo Krawczyk

Lecture Notes in Computer Science, 2010

View PDFchevron_right

Peer-to-Peer File Sharing WebApp

Swati Bhisikar

International Journal on Recent and Innovation Trends in Computing and Communication, 2023

View PDFchevron_right

Secure Message Transmission with Small Public Discussion

Juan A. Garay

Springer eBooks, 2010

View PDFchevron_right

A secured key issuing protocol for peer-to-peer network

Thaksen Parvat

2014 IEEE Global Conference on Wireless Computing & Networking (GCWCN), 2014

View PDFchevron_right