An ID-based authenticated three-party key exchange protocol (original) (raw)

An Enhanced and Secure Three-Party Password-based Authenticated Key Exchange Protocol without Using Server’s Public-Keys and Symmetric Cryptosystems

mohammad sabzinejad Farash

View PDFchevron_right

An novel three-party authenticated key exchange protocol using one-time key

Maode Ma

Journal of Network and Computer Applications, 2013

View PDFchevron_right

A Survey on Three-Party Password-Based Authenticated Key Exchange (3-PAKE) Protocols

Rekha Saraswat

2015

View PDFchevron_right

Efficient Three Party Key Exchange Protocol

Manju Sanghi

Bulletin of Electrical Engineering and Informatics, 2012

View PDFchevron_right

A Comparison Study on Key Exchange-Authentication Protocol

Ian Chai, Sin-Ban Ho

ijcaonline.org

View PDFchevron_right

A Novel Password Protected Key Exchange Protocol

Santosh Naidu, P R SANTOSH NAIDU CSE, JNTUK UCEV

View PDFchevron_right

On the security of a simple three-party key exchange protocol without server's public keys

Minkyu Park

TheScientificWorldJournal, 2014

View PDFchevron_right

An Efficient Two-Party Identity-Based Key Exchange Protocol

Yuh-Min Tseng

Informatica

View PDFchevron_right

An Efficient and Secure Three-Pass Authenticated Key. Agreement Elliptic Curve Based Protocol

Yaw-Chung Chen

International journal of innovative computing, information & control: IJICIC

View PDFchevron_right

Cryptanalysis of a Three-party Password-based Authenticated Key Exchange Protocol

Ashwin Chandrasekar

View PDFchevron_right

On the security of a password-only authenticated three-party key exchange protocol

Juryon Paik

View PDFchevron_right

A New Efficient Authenticated ID-Based Group Key Agreement Protocol

mohammad sabzinejad Farash

2011

View PDFchevron_right

A New Authenticated Key Agreement Protocol

Kee-Won Kim

New Technologies, Mobility and Security

View PDFchevron_right

Improved Two-Party ID-Based Authenticated Key Agreement Protocol

Felix Valynte

View PDFchevron_right

A secure and efficient identity-based authenticated key exchange protocol for mobile client–server networks

mohammad sabzinejad Farash

View PDFchevron_right

Comparative Study of Tripartite Identity-Based Authenticated Key Agreement Protocols

Tatjana Welzer

Informatica (slovenia), 2009

View PDFchevron_right

A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants

Yuh-Min Tseng

Computer Networks, 2012

View PDFchevron_right

A Review Based Study of Key Exchange Algorithms

Mukesh Kumar

View PDFchevron_right

A New Efficient Protocol for Authenticated Key Agreement

fatma ahmed

International Journal of Computer and Communication Engineering, 2013

View PDFchevron_right

A Secure Authenticated Key Exchange Protocol for Credential Services

Hideki Imai

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2008

View PDFchevron_right

An enhanced certificateless authenticated key agreement protocol

Sin-Ban Ho

13th International Conference on Advanced Communication Technology (ICACT2011), 2011

View PDFchevron_right

Secure Authenticated Key Exchange Protocol for Credential Services

Dr. R Balakrishna

DESIDOC Journal of Library & Information Technology, 2009

View PDFchevron_right

An enhanced password authenticated key exchange protocol without server public keys

Hamid Karimnejad

2012 International Conference on ICT Convergence (ICTC), 2012

View PDFchevron_right

Two improved two-party identity-based authenticated key agreement protocols

Marko Hölbl, Tatjana Welzer

Computer Standards & Interfaces, 2009

View PDFchevron_right

A Study on Asymmetric Key Exchange

Prof.d.s.r. Murthy

2012

View PDFchevron_right

Secure three-party key distribution protocol for fast network access in EAP-based wireless networks

Antonio Skarmeta

Computer Networks, 2010

View PDFchevron_right

Secure Public Key Protocol for Ad-Hoc Wireless Networks

shahana tanveer

2012

View PDFchevron_right