Systematic Design of Two-Party Authentication Protocols (original) (raw)

Design and Implementation of a Secure Communication Protocol

International Journal of Electrical and Computer Engineering (IJECE)

International Journal of Electrical and Computer Engineering (IJECE), 2018

View PDFchevron_right

A Novel Password Protected Key Exchange Protocol

Santosh Naidu, P R SANTOSH NAIDU CSE, JNTUK UCEV

View PDFchevron_right

An Approach to Cryptosystem through a Proposed and Secured Protocol

shafiqul abidin

International Journal of Computer Applications, 2012

View PDFchevron_right

On the security of recent protocols

john clark

Information Processing Letters, 1995

View PDFchevron_right

A New Scheme for Key Exchange

Debajit Sensarma

ijmer.com

View PDFchevron_right

A New Efficient Protocol for Authenticated Key Agreement

fatma ahmed

International Journal of Computer and Communication Engineering, 2013

View PDFchevron_right

A Comparison Study on Key Exchange-Authentication Protocol

Ian Chai, Sin-Ban Ho

ijcaonline.org

View PDFchevron_right

A Cryptographic Keys Transfer Protocol for Secure Communicating Systems

Traian MUNTEAN

View PDFchevron_right

Arcanum : A Secure and Efficient Key Exchange Protocol for the Internet

Ashraf Masood

2004

View PDFchevron_right

Design of Secured Protocols

Kartheek D N

View PDFchevron_right

Pretty-simple password-authenticated key-exchange protocol proven to be secure in the standard model

Hideki Imai

IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences

View PDFchevron_right

A new family of authentication protocols

Harry Manifavas, Bruno Crispo

ACM SIGOPS …, 1998

View PDFchevron_right

An ID-based authenticated three-party key exchange protocol

Susmita Mandal

ACCENTS Transactions on Information Security, 2017

View PDFchevron_right

Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels

Ran Canetti

Lecture Notes in Computer Science, 2001

View PDFchevron_right

On the security of public key protocols

nabil benhamza

Information Theory, IEEE Transactions on, 1983

View PDFchevron_right

Security Protocols: Specification, Verification, Implementation, and Composition

Omar Almousa

2016

View PDFchevron_right

FORMULATION OF A SECURE COMMUNICATION PROTOCOL AND ITS IMPLEMENTATION

IRJET Journal

View PDFchevron_right

A Simple Leakage-Resilient Authenticated Key Establishment Protocol, Its Extensions, and Applications

Hideki Imai

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2005

View PDFchevron_right

The kryptoknight family of light-weight protocols for authentication and key distribution

Refik Molva

1995

View PDFchevron_right

A New Secure Protocol for Authenticated Key Agreement

fatma ahmed

International Journal of Engineering and Technology, 2013

View PDFchevron_right

A provably secure one-pass two-party key establishment protocol

Konstantinos Chalkias

Information Security and …, 2008

View PDFchevron_right

A Note on an . . . Cryptographic Protocol Insecurity

zhiyao liang

2008

View PDFchevron_right

A Novel Approach to the Design of a New Hybrid Security Protocol Architecture

Dr. Amit Sinhal

View PDFchevron_right

A Novel Cryptographic Approach for Preventing Attacks in a Network

PRATIBHA LANKA

2016

View PDFchevron_right

Forward-Secure Authenticated Symmetric Key Exchange Protocol: New Security Model and Secure Construction

Suvradip Chakraborty

View PDFchevron_right

Secure Communication Using Encryption, Challenges and O

SDIWC Organization

View PDFchevron_right

A New Authenticated Key Agreement Protocol

Kee-Won Kim

New Technologies, Mobility and Security

View PDFchevron_right

Cryptographic protocols for third generation mobile communication systems

DongGook Park

2001

View PDFchevron_right