On the logical verification of a group key agreement protocol for resource constrained mobile devices (original) (raw)

On the security analysis of authenticated group key exchange protocols for low-power mobile devices

Thomas Newe

2007

View PDFchevron_right

On the logical verification of key exchange protocols for mobile communications

Thomas Newe

2003

View PDFchevron_right

A secure authenticated group key agreement protocol for resource-limited mobile devices

Yuh-Min Tseng

The Computer Journal

View PDFchevron_right

Hybrid mobile security protocol: Formal verification using a new modal logic

Thomas Newe

2002

View PDFchevron_right

DDH based group key agreement for mobile computing

Seungjoo Kim

2004

View PDFchevron_right

DDH-based group key agreement in a mobile environment

Seungjoo Kim

Journal of Systems and Software, 2005

View PDFchevron_right

Formal analysis of a novel mutual authentication and key agreement protocol

Jaafer Al-Saraireh

Journal of Computer Science and Technology, 2011

View PDFchevron_right

A Novel Group-based Secure Lightweight Authentication and Key Agreement Protocol forMachine-Type Communication

Javad Mohajeri

Scientia Iranica, 2021

View PDFchevron_right

Mutual authentication and group key agreement for low-power mobile devices

Abdelilah Essiari

Computer Communications, 2004

View PDFchevron_right

Group-Based Authentication and Key Agreement

Chien-chao Tseng

Wireless Personal Communications, 2012

View PDFchevron_right

Scalable Group Key Agreement using Key Tree in Mobile Environment

IJSES Editor

View PDFchevron_right

A weakness in the Bresson-Chevassut-Essiari-Pointcheval's group key agreement scheme for low-power mobile devices

Seungjoo Kim

IEEE Communications Letters, 2005

View PDFchevron_right

Cryptographic protocols for third generation mobile communication systems

DongGook Park

2001

View PDFchevron_right

On the Security of Authenticated Group Key Agreement Protocols

Himani Bansal

Scalable Computing: Practice and Experience

View PDFchevron_right

A three round authenticated group key agreement protocol for ad hoc networks

Valérie Issarny

Pervasive and Mobile Computing, 2007

View PDFchevron_right

Security Verification for Authentication and Key Exchange Protocols, Revisited

Shinsaku Kiyomoto

2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops, 2010

View PDFchevron_right

A Group-Based Key Management Protocol for Mobile Ad Hoc Networks

Sherman Shen

GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference, 2009

View PDFchevron_right

Secure authenticated group key agreement protocol in the MANET environment

Kyusuk Han

Information Security Technical Report, 2008

View PDFchevron_right

An Efficient Dynamic Group Key Agreement for Low-Power Mobile Devices

Seungjoo Kim

Lecture Notes in Computer Science, 2005

View PDFchevron_right

Efficient and secure keys management for wireless mobile communications

Sushil Jajodia

2002

View PDFchevron_right

Security enhancement to a password-authenticated group key exchange protocol for mobile Ad-hoc networks

Juryon Paik

IEEE Communications Letters, 2008

View PDFchevron_right

Message Authentication Code Based Secure Group Key Management Protocol for Mobile Ad Hoc Networks

V. Rajamani

Journal of Computer Science, 2013

View PDFchevron_right

Key management paradigm for mobile secure group communications: Issues, solutions, and challenges

Parvaneh Asghari

Computer Communications, 2015

View PDFchevron_right

A Group Key Agreement Protocol based on stability and power using Elliptic curve cryptography

Muthumayil Krishnan, buvana muthumayil

View PDFchevron_right

A secure and efficient password-authenticated group key exchange protocol for mobile ad hoc networks

Maode Ma

International Journal of Communication Systems, 2013

View PDFchevron_right

Efficient Symmetric and Heterogeneous Mobile Group-Based Key Management Protocol

فؤاد الكبيسي, Sufyan Al-Janabi

View PDFchevron_right

Security verification for authentication and key exchange protocols

Shinsaku Kiyomoto

2008 International Symposium on Information Theory and Its Applications, 2008

View PDFchevron_right

Authenticated Group Key Agreement Protocols for Error Detection and Correction

International Journal of Scientific Research in Computer Science, Engineering and Information Technology IJSRCSEIT

International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2019

View PDFchevron_right

On Security Models and Compilers for Group Key Exchange Protocols

Mark Manulis

Lecture Notes in Computer Science, 2007

View PDFchevron_right

Tree-based group key agreement framework for mobile ad-hoc networks

Mark Manulis

Future Generation Computer Systems, 2007

View PDFchevron_right

Automatic security verification for 3-party authentication and key exchange protocols

Shinsaku Kiyomoto

2011 5th International Conference on Network and System Security, 2011

View PDFchevron_right

A New Efficient Protocol for Authenticated Key Agreement

fatma ahmed

International Journal of Computer and Communication Engineering, 2013

View PDFchevron_right

Protocols with Security Proofs for Mobile

Juan Manuel CH.

View PDFchevron_right

A New Authenticated Key Agreement Protocol

bachar elhassan

New Technologies, Mobility and Security

View PDFchevron_right