Academic literature on the topic 'Strong Key Agreement Scheme'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Strong Key Agreement Scheme.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Strong Key Agreement Scheme"
Alimoradi, Reza. "A new certificateless multiple key agreement scheme." Discrete Mathematics, Algorithms and Applications 09, no. 01 (February 2017): 1750002. http://dx.doi.org/10.1142/s1793830917500021.
Full textSun, Mei, Yuyan Guo, Dongbing Zhang, and MingMing Jiang. "Anonymous Authentication and Key Agreement Scheme Combining the Group Key for Vehicular Ad Hoc Networks." Complexity 2021 (May 4, 2021): 1–13. http://dx.doi.org/10.1155/2021/5526412.
Full textCao, Liling, Mei Liang, Zheng Zhang, and Shouqi Cao. "Certificateless Cross-Domain Group Authentication Key Agreement Scheme Based on ECC." Wireless Communications and Mobile Computing 2022 (December 5, 2022): 1–16. http://dx.doi.org/10.1155/2022/7519688.
Full textZhang, Li Hua, Li Ping Zhang, and Er Fei Bai. "Generalized Elliptic Curve Digital Signature Chain Based Authentication and Key Agreement Scheme." Advanced Materials Research 108-111 (May 2010): 1503–8. http://dx.doi.org/10.4028/www.scientific.net/amr.108-111.1503.
Full textZhang, Yuanyuan, and Zhibo Zhai. "An efficient and provably secure key agreement scheme for satellite communication systems." PLOS ONE 16, no. 4 (April 26, 2021): e0250205. http://dx.doi.org/10.1371/journal.pone.0250205.
Full textGong, Xiang, and Tao Feng. "Lightweight Anonymous Authentication and Key Agreement Protocol Based on CoAP of Internet of Things." Sensors 22, no. 19 (September 22, 2022): 7191. http://dx.doi.org/10.3390/s22197191.
Full textChandrakar, Preeti, and Hari Om. "A Secure Two-Factor Remote User Authentication and Session Key Agreement Scheme." International Journal of Business Data Communications and Networking 12, no. 2 (July 2016): 62–79. http://dx.doi.org/10.4018/ijbdcn.2016070104.
Full textZahednejad, Behnam, Huang Teng, Saeed Kosari, and Ren Xiaojun. "A Lightweight, Secure Big Data-Based Authentication and Key-Agreement Scheme for IoT with Revocability." International Journal of Intelligent Systems 2023 (April 29, 2023): 1–19. http://dx.doi.org/10.1155/2023/9731239.
Full textMao, Deming, Ling Zhang, Xiaoyu Li, and Dejun Mu. "Trusted Authority Assisted Three-Factor Authentication and Key Agreement Protocol for the Implantable Medical System." Wireless Communications and Mobile Computing 2018 (July 29, 2018): 1–16. http://dx.doi.org/10.1155/2018/7579161.
Full textAbderrezzak, Sebbah, and Kadri Benamar. "A Strong ECC Based on Secure Authentication with Privacy for IoT Concepts." International Journal of Technology Diffusion 13, no. 1 (January 1, 2022): 1–22. http://dx.doi.org/10.4018/ijtd.313643.
Full textDissertations / Theses on the topic "Strong Key Agreement Scheme"
Fujdiak, Radek. "Analýza a optimalizace datové komunikace pro telemetrické systémy v energetice." Doctoral thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-358408.
Full textTiwari, Mayank. "Fully Resilient Non-Interactive ID-Based Hierarchical Key Agreement." Thesis, 2018. https://etd.iisc.ac.in/handle/2005/4352.
Full textTurnip, Togu, and 唐天凱. "Anonymous Group Key Agreement Scheme for Mobile Networks." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/97185328987360408418.
Full text國立臺灣科技大學
資訊管理系
104
Because of growing demand of the group-oriented applications, the secure and reliable group communication increases popularity in mobile networks. For securing group communications, a number of authenticated group key agreement (AGKA) schemes have been proposed based on certificateless public key cryptography (CL-PKC). AGKA scheme ensures group members to communicate with each other securely over insecure networks. However, the most of the AGKA schemes are implemented using bilinear pairing and without consideration of the user anonymity feature. In this thesis, the author proposed an anonymous certificateless authenticated group key agreement scheme without using bilinear pairing for resource-limited mobile devices due to the heavy computational overhead. The proposed scheme also provides join and leave procedures to enable the dynamic group operations by adopting Huffman key tree in order to minimize the negotiation rounds and reduce computational costs. This thesis analyzed the security of the proposed scheme and the proposed scheme obtains the desired security attributes with anonymity. Moreover, the security of proposed scheme was also evaluated by using BAN logic which shows that each group members generate a fresh, common and secure shared group key. Finally, the proposed scheme has relatively efficient performance in terms of communication and computation overheads than the others existing CL-PKC schemes. Hence, the proposed scheme is suitable to be used for resource-limited mobile devices.
Chen, Hua-Yueh, and 陳華嶽. "Key Agreement Scheme for 3G Mobile Communication Systems." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/9z8vyt.
Full text國立臺灣科技大學
資訊管理系
95
Communicating and exchanging information with others by using third generation mobile communication (3G) is the future trend. However, the third generation mobile telecommunication system security is only limited to user-to-network or vice versa. It can not provide end-to-end protection. Mutual authentication and session key establishment can be achieved by authenticated key agreement scheme. Unfortunately, we still need to increase some modules to the current 3G system in order to implement the published low-power device key agreement schemes. Hence we use XOR, one-way hash function and one-way functions existing in the current third generation communication system to design key agreement scheme for 3G. We also propose a group key agreement scheme for the application of group communication. Our scheme will satisfy the following properties: (1) Implement on 3G system easily. (2) Achieve authentication and key agreement to ensure confidentiality of conferences. (3) Establish group key. (4) Ensure privacy of conferees’ locations. (5) Detect fake devices and avoid replay attack. (6) Has session key that is of nondisclosure, independence and integrity.
Lin, Zhi-Liang, and 林致良. "An Efficient Certificateless Authenticated Tripartite Key Agreement Scheme." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/87511075350141507082.
Full text國立中興大學
資訊科學與工程學系
102
The Key agreement protocol allows two or more parties to establish a shared session key by exchanging messages over an open network. In 1976, Diffie and Hellman proposed the first key agreement protocol which enables two parties to establish a shared session key. Such protocol does not provide authentication of the communicating parties and is thus vulnerable to man-in-the-middle attack. In 2000, Joux proposed the first one round tripartite key agreement protocol. In fact, their protocol is also suffering from man-in-the-middle attack. Over the years, different approaches with authentication have been widely proposed to slove the problem. To overcome the drawbacks of managing certificates in traditional public key infrastructure and solving the key escrow problem in ID-based cryptosystem. Al-Riyami and Paterson first invented certificateless public key cryptography in 2003. Later on, Gao et al. proposed the first certificateless authenticated tripartite key agreement protocol. In this thesis, we present an efficient authenticated tripartite key agreement scheme based on certificateless public key cryptography. Our protocol is more efficient than Gao et al.’s, and we also show that the proposed scheme can meet the security requirements.
GONG, JAIN-CHENG, and 龔建丞. "An Improved Authenticated Key Agreement Scheme with Smart Card." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/09029784157900512107.
Full text中國文化大學
資訊管理學系
105
With the evolution of Network and Information technology, the smart card makes us more convenience in daily life. The remote user and server are often using smart cards for authentication. In order to protect the privacy of users, the security of using smart card are becoming more and more important. In 2015, Chaudhry et al. proposed that Kumari et al.’s scheme has weaknesses, and proposed an improved scheme. They indicate their scheme can against many attack. However, we find that the Chaudhry et al.’s scheme is still with security problem. In 2015, Shi et al. also proposed that Kumari et al.’s other authentication scheme had many security problems, and proposed an improved scheme, but we find that scheme was still insecure. In this paper, we will analyze that weaknesses of Chaudhry et al.’s and Shi et al’s scheme, and improve Chaudhry et al.’s scheme to avoid their security problems. We also apply the security analysis and security comparison and efficiency analysis with other schemes that prove our scheme is secure and can apply it in everyday life.
Hsu, Ming-Huei, and 許明暉. "An Efficient Electronic Mail Protocol and Key Agreement Scheme." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/65109319908697682953.
Full text朝陽科技大學
資訊工程系碩士班
97
E-mail has become an irreplaceable mean of communication in the era of Internet age. Yet, since the early days, when e-mails were exchanged as normal text files without any safety mechanism, safety and privacy has always been a crucial agenda for e-mail exchanges. This paper, with modern cryptography, would discuss an e-mail protocol for better safety and privacy, as one of the key issues for e-mail security is to assure the identity of the destined recipient. In such a forward secrecy protocol, PGP (pretty Good Privacy) encryption is not included because of its high system demand for calculation capacity, and instead of session keys, passwords play the main part of identity verification; so the protocol discussed here would be suitable for mobile devices. As for the security issue, such protocol would be built on discreet logarithms so that attackers do not have access to the user privacy in the public information. Secondary, there are more and more services that can be obtained from servers with easy access, which means such accesses are opened for attacked, such as user privacy, attacks and hacks on server, and consequently brought the disruption to such services. This paper would discuss an efficient key agreement protocol that requires the user to use password, or finger-print recognition system to obtain mutual authentication with the server, and the session key. For its security measure, this forward-secrecy protocol can resist against stolen-verifier attack, Denial of Service DoS, and known-key attack, so the users can obtain services from servers via the internet securely.
Liu, Jian-You, and 劉建佑. "An Anonymous Authentication and Key Agreement Scheme in VANETs." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/14100499819856958404.
Full text國立中山大學
資訊工程學系研究所
100
Vehicular ad-hoc network (VANETs) has been a hot research topic in recent years. In this environment, each vehicle can broadcast messages to other vehicles and inform drivers to change their route right away in order to enhance the efficiency of driving and to avoid accidents. Since vehicles communicate through wireless tunnel, many malicious attacks may occur during the transmission of messages. Consequently, ensuring the correctness of receiving messages and verifying the authenticity of the sender is necessary. Besides, we also need to protect the real identities of vehicles from revealing to guarantee the privacy. To satisfy these security properties, many related researches have been proposed. However, they all have some drawbacks. For example: 1. The cost of the certificate management and the exposure problem of the certificate. 2. Waiting for RSU to verify the messages: Once more vehicles need RSU, RSU will have much more overhead and it can’t achieve real-time authentication. In this thesis, we come up with an anonymous authentication and key agreement scheme based on chameleon hashing and ID-based cryptography in the vehicular communication environment. In our scheme, every vehicle can generate many different chameleon hash values to represent itself, and others can prove the ownership of chameleon hash value. Furthermore, unlike other pseudonymous authentication schemes, we also achieve one-to-one private communication via ID-based cryptography. Finally, we not only overcome some problems in previous works but also fulfill some necessary security requirements in vehicular communication environment.
Liao, Yi-Ching, and 廖一清. "Improvement on a Remote User Authentication Scheme with Key Agreement." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/80995015652062666555.
Full text南華大學
資訊管理學系
104
Recently, Kumari et al. pointed out that Chang et al.’s “Untraceable dynamic-identity-based remote user authentication scheme with verifiable password update” not only has several drawbacks, but also does not provide any session key agreement. Hence, they proposed an improvement with key agreement on the scheme. After cryptanalysis, they confirmed its security properties. However, we determined that the improved scheme still suffers from both anonymity breach and the smart card loss password guessing attack, which are two of the ten basic requirements in a secure identity authentication protocal using smart card, insisted by Liao et al. Therefore, we modified their improvement to include those desired security functionalities, which are significantly important in a user authentication smart card system.
He, Bing-Zhe, and 何秉哲. "A Group Key Agreement Scheme with Certificateless and Time-bound Properties." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/7zp5ut.
Full textBooks on the topic "Strong Key Agreement Scheme"
Dawson, John, and Tom Burns. Lowering legal barriers to transitioning mentally disordered offenders into general mental health care. Edited by Alec Buchanan and Lisa Wootton. Oxford University Press, 2017. http://dx.doi.org/10.1093/med/9780198738664.003.0014.
Full textDavies, Paul S. JC Smith's The Law of Contract. 3rd ed. Oxford University Press, 2021. http://dx.doi.org/10.1093/he/9780198853503.001.0001.
Full textDavies, Paul S. JC Smith's The Law of Contract. Oxford University Press, 2018. http://dx.doi.org/10.1093/he/9780198807810.001.0001.
Full textTulloch, John, and Belinda Middleweek. Actors and Sexual Intimacies. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190244606.003.0010.
Full textCloete, Nico, Tracy Bailey, and Peter Maassen. Universities and Economic Development in Africa. African Minds, 2011. http://dx.doi.org/10.47622/9781920355807.
Full textBook chapters on the topic "Strong Key Agreement Scheme"
Wang, Jinlong, Shuai Zhang, Peijian Luo, and Xinwei Zhao. "A Strong Security Key Agreement Scheme for Underwater Acoustic Networks." In Lecture Notes in Electrical Engineering, 666–77. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-2287-1_94.
Full textMoreno-Fuentes, Francisco Javier. "Migrants’ Access to Social Protection in Spain." In IMISCOE Research Series, 405–20. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-51241-5_27.
Full textYoon, Eun-Jun, and Kee-Young Yoo. "Biometrics Authenticated Key Agreement Scheme." In Next Generation Information Technologies and Systems, 345–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11780991_32.
Full textBobrysheva, Julia, and Sergey Zapechnikov. "Post-quantum Group Key Agreement Scheme." In Brain-Inspired Cognitive Architectures for Artificial Intelligence: BICA*AI 2020, 49–55. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-65596-9_7.
Full textChen, Hsing-Chung, and Chung-Wei Chen. "A Secure Multicast Key Agreement Scheme." In Information and Communication Technology, 275–81. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-24315-3_28.
Full textFischlin, Marc. "The Cramer-Shoup Strong-RSA Signature Scheme Revisited." In Public Key Cryptography — PKC 2003, 116–29. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-36288-6_9.
Full textLiagkou, Vasiliki, Effie Makri, Paul Spirakis, and Yannis Stamatiou. "A Probabilistic Key Agreement Scheme for Sensor Networks without Key Predistribution." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 72–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33448-1_11.
Full textYu, Yang, Aixin Zhang, Junhua Tang, and Haopeng Chen. "A Dynamic Scheme for Authenticated Group Key Agreement Protocol." In Novel Algorithms and Techniques in Telecommunications and Networking, 245–50. Dordrecht: Springer Netherlands, 2009. http://dx.doi.org/10.1007/978-90-481-3662-9_42.
Full textSmith, Andrew, and Colin Boyd. "An elliptic curve analogue of McCurley's key agreement scheme." In Cryptography and Coding, 150–57. Berlin, Heidelberg: Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/3-540-60693-9_17.
Full textYang, Mee Loong, Adnan Al Anbuky, and William Liu. "Security of the Multiple-Key Blom’s Key Agreement Scheme for Sensor Networks." In ICT Systems Security and Privacy Protection, 66–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-55415-5_6.
Full textConference papers on the topic "Strong Key Agreement Scheme"
Lu, Yung-Feng, Po-Hung Lin, Sheng-Shang Ye, Rong-Sheng Wang, and Shih-Chun Chou. "A strong authentication with key agreement scheme for web-based collaborative systems." In 2012 International Symposium on Intelligent Signal Processing and Communications Systems (ISPACS 2012). IEEE, 2012. http://dx.doi.org/10.1109/ispacs.2012.6473508.
Full textGope, Prosanta, Ruei-Hau Hsu, Jemin Lee, and Tony Q. S. Quek. "Energy Efficient Mutual Authentication and Key Agreement Scheme with Strong Anonymity Support for Secure Ubiquitious Roaming Services." In 2016 11th International Conference on Availability, Reliability and Security (ARES ). IEEE, 2016. http://dx.doi.org/10.1109/ares.2016.52.
Full textLallemand, Joseph, David Basin, and Christoph Sprenger. "Refining Authenticated Key Agreement with Strong Adversaries." In 2017 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, 2017. http://dx.doi.org/10.1109/eurosp.2017.22.
Full textOh, Ka-Kyung, Tae-You Lee, Choon-Sung Nam, and Dong-Ryeol Shin. "Strong Authentication and Key Agreement Protocol in UMTS." In 2009 Fifth International Joint Conference on INC, IMS and IDC. IEEE, 2009. http://dx.doi.org/10.1109/ncm.2009.196.
Full textChan, Chao-Wen, and Te-Chih Chiu. "A key agreement based anonymity scheme." In Multimedia Technology (IC-BNMT 2011). IEEE, 2011. http://dx.doi.org/10.1109/icbnmt.2011.6156018.
Full textCao, Zhengjun, and Lihua Liu. "A Group Key Agreement Scheme Revisited." In 2008 Fourth International Conference on Information Assurance and Security (IAS). IEEE, 2008. http://dx.doi.org/10.1109/ias.2008.13.
Full textChang, Chin-Chen, and Shih-Yi Lin. "An Improvement on Authenticated Key Agreement Scheme." In The 2007 International Conference on Intelligent Pervasive Computing (IPC 2007). IEEE, 2007. http://dx.doi.org/10.1109/ipc.2007.49.
Full textXia, Jingbo, Yu Rongwei, and Xiaochuan Ai. "A New Efficient Hierarchical Key Agreement Scheme." In 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC 2009). IEEE, 2009. http://dx.doi.org/10.1109/nswctc.2009.80.
Full textLi, Haitao, Shize Guo, Kangfeng Zheng, Zhe Chen, and Jun Cui. "Improved Adoptable Scheme for Authentication and Key Agreement." In 2009 International Conference on Management and Service Science (MASS). IEEE, 2009. http://dx.doi.org/10.1109/icmss.2009.5301997.
Full textDahai Du, Qiao Li, Zheng Li, Hong Fan, Chengyuan Li, and Hua Shao. "A key agreement scheme for avionics communications security." In 2012 IEEE/AIAA 31st Digital Avionics Systems Conference (DASC). IEEE, 2012. http://dx.doi.org/10.1109/dasc.2012.6382414.
Full textReports on the topic "Strong Key Agreement Scheme"
Lyzanchuk, Vasyl. COMMUNICATIVE SYNERGY OF UKRAINIAN NATIONAL VALUES IN THE CONTEXT OF THE RUSSIAN HYBRID WAR. Ivan Franko National University of Lviv, February 2021. http://dx.doi.org/10.30970/vjo.2021.49.11077.
Full text