An ID-based authenticated three-party key exchange protocol (original) (raw)
Related papers
An novel three-party authenticated key exchange protocol using one-time key
Journal of Network and Computer Applications, 2013
A Survey on Three-Party Password-Based Authenticated Key Exchange (3-PAKE) Protocols
2015
Efficient Three Party Key Exchange Protocol
Bulletin of Electrical Engineering and Informatics, 2012
A Comparison Study on Key Exchange-Authentication Protocol
ijcaonline.org
A Novel Password Protected Key Exchange Protocol
Santosh Naidu, P R SANTOSH NAIDU CSE, JNTUK UCEV
On the security of a simple three-party key exchange protocol without server's public keys
TheScientificWorldJournal, 2014
An Efficient Two-Party Identity-Based Key Exchange Protocol
Informatica
An Efficient and Secure Three-Pass Authenticated Key. Agreement Elliptic Curve Based Protocol
International journal of innovative computing, information & control: IJICIC
Cryptanalysis of a Three-party Password-based Authenticated Key Exchange Protocol
On the security of a password-only authenticated three-party key exchange protocol
A New Efficient Authenticated ID-Based Group Key Agreement Protocol
2011
A New Authenticated Key Agreement Protocol
New Technologies, Mobility and Security
Improved Two-Party ID-Based Authenticated Key Agreement Protocol
Comparative Study of Tripartite Identity-Based Authenticated Key Agreement Protocols
Informatica (slovenia), 2009
Computer Networks, 2012
A Review Based Study of Key Exchange Algorithms
A New Efficient Protocol for Authenticated Key Agreement
International Journal of Computer and Communication Engineering, 2013
A Secure Authenticated Key Exchange Protocol for Credential Services
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2008
An enhanced certificateless authenticated key agreement protocol
13th International Conference on Advanced Communication Technology (ICACT2011), 2011
Secure Authenticated Key Exchange Protocol for Credential Services
DESIDOC Journal of Library & Information Technology, 2009
An enhanced password authenticated key exchange protocol without server public keys
2012 International Conference on ICT Convergence (ICTC), 2012
Two improved two-party identity-based authenticated key agreement protocols
Computer Standards & Interfaces, 2009
A Study on Asymmetric Key Exchange
2012
Secure three-party key distribution protocol for fast network access in EAP-based wireless networks
Computer Networks, 2010
Secure Public Key Protocol for Ad-Hoc Wireless Networks
2012