Robust Authentication and Session Key Agreement Protocol for Satellite Communications (original) (raw)

A New Authenticated Key Agreement Protocol

AbdAllah A . AlHabshy

New Technologies, Mobility and Security

View PDFchevron_right

An Authenticated Key Exchange Mechanism Using One-Time Shared Key

Yonghwan Lee

Lecture Notes in Computer Science, 2005

View PDFchevron_right

Experimental experience with Host Identity Protocol (HIP)

nahla abid

HAL (Le Centre pour la Communication Scientifique Directe), 2008

View PDFchevron_right

Which Transport Protocol for Hybrid Terrestrial and Satellite Systems?

Fabrice Planchou

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2013

View PDFchevron_right

Cross-protocol attacks

Mohamed Kaaniche

2021

View PDFchevron_right

Developing a Security Typed Java Servlet

Doaa Salem

2008 The Fourth International Conference on Information Assurance and Security, 2008

View PDFchevron_right

Unauthorized Access Detection in Underlay Cognitive Satellite Networks

Francesco Benedetto

IEEE networking letters, 2021

View PDFchevron_right

Survey and Taxonomy of Key Management Protocols for Wired and Wireless Networks

Alok Aggarwal

International Journal of Network Security & Its Applications, 2012

View PDFchevron_right

A Comparison Study on Key Exchange-Authentication protocol

Sin-Ban Ho

International Journal of Computer Applications, 2010

View PDFchevron_right

Principles and Practices of Network Security

Dr Ihtiram Raza Khan

Zenodo (CERN European Organization for Nuclear Research), 2023

View PDFchevron_right

Symmetric key-based authenticated encryption protocol

Sanjay Singh

Information Security Journal: A Global Perspective, 2019

View PDFchevron_right

Mobile and Personal Satellite Communications 3

Fulvio Ananasso

1999

View PDFchevron_right

A new generic protocol for authentication and key agreement in lightweight systems

Olivier Markowitch

View PDFchevron_right

Mobile Satellite Protocol Testbed

Polly Estabrook

1997

View PDFchevron_right

Threshold Password-Authenticated Key Exchange

Markus Jakobsson

Journal of Cryptology, 2005

View PDFchevron_right

Practical provably secure multi-node communication

Ali Omar Ali

2014 International Conference on Computing, Networking and Communications (ICNC), 2014

View PDFchevron_right

An Enhanced Authentication Protocol for RFID Systems

bao huynh

IEEE Access, 2020

View PDFchevron_right

Reliable aeronautical services protocol: Laboratory testing and verification

Muhammad Muhammad

2013 IEEE/AIAA 32nd Digital Avionics Systems Conference (DASC), 2013

View PDFchevron_right

Security Analysis of Key Agreement Protocol Based on Enhanced Matrix Power Function

Eligijus Sakalauskas

IET Information Security, 2020

View PDFchevron_right

A class of authentication codes with secrecy

elif kurtaran ozbudak

Designs, Codes and Cryptography, 2010

View PDFchevron_right

Security in Computer Networks: Threats, Challenges, and Protection

Malvina Niklekaj

Ingenious, 2022

View PDFchevron_right

Resource Fairness and Composability of Cryptographic Protocols

Juan A. Garay

Lecture Notes in Computer Science, 2006

View PDFchevron_right

Architecture and networking issues in satellite systems for personal communications

Fulvio Ananasso

International Journal of Satellite Communications, 1994

View PDFchevron_right

Latest Challenges and Trends in Network Security: Facing Cyber Threats in the Digital Era

Charlista Gozal

Journal of Artificial Intelligence and Engineering Applications, 2024

View PDFchevron_right

Securing Internet of Drones With Identity-Based Proxy Signcryption

Rozaida Ghazali

IEEE Access, 2021

View PDFchevron_right

Allende HRTEM study v1 (protocols.io.3f4gjqw)

Hugo I . Cruz-Rosas

protocols.io, 2019

View PDFchevron_right

Verification of three authentication protocols using BAN, SVO and Strand Spaces

Fabio Piva

Citeseer

View PDFchevron_right

The Security Challenges Emerging from the Technological Developments

Ricardo Montenegro

Mobile Networks and Applications, 2019

View PDFchevron_right

Satellite systems for personal communication networks

Fulvio Ananasso

Computer Standards & Interfaces, 1999

View PDFchevron_right

The Aerospace Corporation’s Space Traffic Management Research Programme

Mark Skinner

8th European Conference on Space Debris, 2021

View PDFchevron_right

A Novel Authentication Mechanism for Mobile Satellite Communication Systems

Anca Delia Jurcut

2019

View PDFchevron_right

UIP2SOP: A Unique IoT Network applying Single Sign-On and Message Queue Protocol

Thảo Vũ Thị

International Journal of Advanced Computer Science and Applications, 2021

View PDFchevron_right

Efficient identity-based authenticated key agreement protocol from pairings

YOUNGJU CHOIE

Applied Mathematics and Computation, 2005

View PDFchevron_right

Secure Communication Between Unmanned Aerial Vehicle and Ground Control Station

Dr. İbrahim Atakan Kubilay

Fen-mühendislik dergisi/Dokuz Eylül Üniversitesi Mühendislik Fakültesi fen ve mühendislik dergisi, 2024

View PDFchevron_right

Hypertext Transfer Protocol (HTTP) Digest Authentication Using Authentication and Key Agreement (AKA) Version2

Mats Naslund

2005

View PDFchevron_right