Systematic Design of Two-Party Authentication Protocols (original) (raw)
Related papers
Design and Implementation of a Secure Communication Protocol
International Journal of Electrical and Computer Engineering (IJECE)
International Journal of Electrical and Computer Engineering (IJECE), 2018
A Novel Password Protected Key Exchange Protocol
Santosh Naidu, P R SANTOSH NAIDU CSE, JNTUK UCEV
An Approach to Cryptosystem through a Proposed and Secured Protocol
International Journal of Computer Applications, 2012
On the security of recent protocols
Information Processing Letters, 1995
ijmer.com
A New Efficient Protocol for Authenticated Key Agreement
International Journal of Computer and Communication Engineering, 2013
A Comparison Study on Key Exchange-Authentication Protocol
ijcaonline.org
A Cryptographic Keys Transfer Protocol for Secure Communicating Systems
Arcanum : A Secure and Efficient Key Exchange Protocol for the Internet
2004
Pretty-simple password-authenticated key-exchange protocol proven to be secure in the standard model
IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences
A new family of authentication protocols
ACM SIGOPS …, 1998
An ID-based authenticated three-party key exchange protocol
ACCENTS Transactions on Information Security, 2017
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
Lecture Notes in Computer Science, 2001
On the security of public key protocols
Information Theory, IEEE Transactions on, 1983
Security Protocols: Specification, Verification, Implementation, and Composition
2016
FORMULATION OF A SECURE COMMUNICATION PROTOCOL AND ITS IMPLEMENTATION
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2005
The kryptoknight family of light-weight protocols for authentication and key distribution
1995
A New Secure Protocol for Authenticated Key Agreement
International Journal of Engineering and Technology, 2013
A provably secure one-pass two-party key establishment protocol
Information Security and …, 2008
A Note on an . . . Cryptographic Protocol Insecurity
2008
A Novel Approach to the Design of a New Hybrid Security Protocol Architecture
A Novel Cryptographic Approach for Preventing Attacks in a Network
2016
Secure Communication Using Encryption, Challenges and O
A New Authenticated Key Agreement Protocol
New Technologies, Mobility and Security
Cryptographic protocols for third generation mobile communication systems
2001