Robust Authentication and Session Key Agreement Protocol for Satellite Communications (original) (raw)
Related papers
A New Authenticated Key Agreement Protocol
New Technologies, Mobility and Security
An Authenticated Key Exchange Mechanism Using One-Time Shared Key
Lecture Notes in Computer Science, 2005
Experimental experience with Host Identity Protocol (HIP)
HAL (Le Centre pour la Communication Scientifique Directe), 2008
Which Transport Protocol for Hybrid Terrestrial and Satellite Systems?
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2013
2021
Developing a Security Typed Java Servlet
2008 The Fourth International Conference on Information Assurance and Security, 2008
Unauthorized Access Detection in Underlay Cognitive Satellite Networks
IEEE networking letters, 2021
Survey and Taxonomy of Key Management Protocols for Wired and Wireless Networks
International Journal of Network Security & Its Applications, 2012
A Comparison Study on Key Exchange-Authentication protocol
International Journal of Computer Applications, 2010
Principles and Practices of Network Security
Zenodo (CERN European Organization for Nuclear Research), 2023
Symmetric key-based authenticated encryption protocol
Information Security Journal: A Global Perspective, 2019
Mobile and Personal Satellite Communications 3
1999
A new generic protocol for authentication and key agreement in lightweight systems
Mobile Satellite Protocol Testbed
1997
Threshold Password-Authenticated Key Exchange
Journal of Cryptology, 2005
Practical provably secure multi-node communication
2014 International Conference on Computing, Networking and Communications (ICNC), 2014
An Enhanced Authentication Protocol for RFID Systems
IEEE Access, 2020
Reliable aeronautical services protocol: Laboratory testing and verification
2013 IEEE/AIAA 32nd Digital Avionics Systems Conference (DASC), 2013
Security Analysis of Key Agreement Protocol Based on Enhanced Matrix Power Function
IET Information Security, 2020
A class of authentication codes with secrecy
Designs, Codes and Cryptography, 2010
Security in Computer Networks: Threats, Challenges, and Protection
Ingenious, 2022
Resource Fairness and Composability of Cryptographic Protocols
Lecture Notes in Computer Science, 2006
Architecture and networking issues in satellite systems for personal communications
International Journal of Satellite Communications, 1994
Latest Challenges and Trends in Network Security: Facing Cyber Threats in the Digital Era
Journal of Artificial Intelligence and Engineering Applications, 2024
Securing Internet of Drones With Identity-Based Proxy Signcryption
IEEE Access, 2021
Allende HRTEM study v1 (protocols.io.3f4gjqw)
protocols.io, 2019
Verification of three authentication protocols using BAN, SVO and Strand Spaces
Citeseer
The Security Challenges Emerging from the Technological Developments
Mobile Networks and Applications, 2019
Satellite systems for personal communication networks
Computer Standards & Interfaces, 1999
The Aerospace Corporation’s Space Traffic Management Research Programme
8th European Conference on Space Debris, 2021
A Novel Authentication Mechanism for Mobile Satellite Communication Systems
2019
UIP2SOP: A Unique IoT Network applying Single Sign-On and Message Queue Protocol
International Journal of Advanced Computer Science and Applications, 2021
Efficient identity-based authenticated key agreement protocol from pairings
Applied Mathematics and Computation, 2005
Secure Communication Between Unmanned Aerial Vehicle and Ground Control Station
Fen-mühendislik dergisi/Dokuz Eylül Üniversitesi Mühendislik Fakültesi fen ve mühendislik dergisi, 2024
2005