An Authenticated Key Exchange Mechanism Using One-Time Shared Key (original) (raw)
Related papers
A New Authenticated Key Agreement Protocol
New Technologies, Mobility and Security
Threshold Password-Authenticated Key Exchange
Journal of Cryptology, 2005
A Comparison Study on Key Exchange-Authentication protocol
International Journal of Computer Applications, 2010
Symmetric key-based authenticated encryption protocol
Information Security Journal: A Global Perspective, 2019
A Review Based Study of Key Exchange Algorithms
Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment
Mobile Networks and Applications, 2018
Efficient identity-based authenticated key agreement protocol from pairings
Applied Mathematics and Computation, 2005
Robust Authentication and Session Key Agreement Protocol for Satellite Communications
Computers, Materials & Continua
A Provably Secure One-Pass Two-Party Key Establishment Protocol
Lecture Notes in Computer Science
Development of IoT based Key Finder
Proceedings of International Conference on Artificial Life and Robotics
Proceedings of the 16th ACM symposium on Access control models and technologies, 2011
A class of authentication codes with secrecy
Designs, Codes and Cryptography, 2010
Secure Key Exchange Against Man-in-the-Middle Attack: Modified Diffie-Hellman Protocol
Jurnal Ilmiah Teknik Elektro Komputer dan Informatika, 2021
Self-organized key management with trusted certificate exchange in MANET
Ain Shams Engineering Journal, 2015
A pairing‐free certificateless authenticated key agreement protocol
International Journal of Communication …, 2012
Vulnerability of two multiple-key agreement protocols
Computers & Electrical Engineering, 2011
Password-authenticated group key agreement with adaptive security and contributiveness
2009
Survey and Taxonomy of Key Management Protocols for Wired and Wireless Networks
International Journal of Network Security & Its Applications, 2012
Novel one hop virtual group shared key management in mobile ad hoc networks
2012 12th International Conference on Intelligent Systems Design and Applications (ISDA), 2012
Developing a Security Typed Java Servlet
2008 The Fourth International Conference on Information Assurance and Security, 2008
2010
Hierarchical key establishment protocols based on secure keyed one-way hash functions
Proceedings Twelfth International Conference on Information Networking (ICOIN-12), 1998
Principles and Practices of Network Security
Zenodo (CERN European Organization for Nuclear Research), 2023
Key Exchange Protocol Using Matrix Algebras and Its Analysis
Journal of the Korean Mathematical Society, 2005
An advanced policy based authorisation infrastructure
Proceedings of the 5th ACM workshop on Digital identity management, 2009
Provable Security for PKI Schemes
IACR Cryptology ePrint Archive, 2019
A Secure and Light Weight Authentication Service in Hadoop using One Time Pad
Procedia Computer Science, 2015
Journal of Public Affairs Education, 2018
Extension of Kerberos with X.509 and Integration of Elliptic Curve Cryptography in Authentication
International Journal of Communications, Network and System Sciences, 2016
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead
Lecture Notes in Computer Science, 2010
Peer-to-Peer File Sharing WebApp
International Journal on Recent and Innovation Trends in Computing and Communication, 2023
Secure Message Transmission with Small Public Discussion
Springer eBooks, 2010
A secured key issuing protocol for peer-to-peer network
2014 IEEE Global Conference on Wireless Computing & Networking (GCWCN), 2014