Literatura académica sobre el tema "Strong Key Agreement Scheme"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Strong Key Agreement Scheme".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Strong Key Agreement Scheme"
Alimoradi, Reza. "A new certificateless multiple key agreement scheme". Discrete Mathematics, Algorithms and Applications 09, n.º 01 (febrero de 2017): 1750002. http://dx.doi.org/10.1142/s1793830917500021.
Texto completoSun, Mei, Yuyan Guo, Dongbing Zhang y MingMing Jiang. "Anonymous Authentication and Key Agreement Scheme Combining the Group Key for Vehicular Ad Hoc Networks". Complexity 2021 (4 de mayo de 2021): 1–13. http://dx.doi.org/10.1155/2021/5526412.
Texto completoCao, Liling, Mei Liang, Zheng Zhang y Shouqi Cao. "Certificateless Cross-Domain Group Authentication Key Agreement Scheme Based on ECC". Wireless Communications and Mobile Computing 2022 (5 de diciembre de 2022): 1–16. http://dx.doi.org/10.1155/2022/7519688.
Texto completoZhang, Li Hua, Li Ping Zhang y Er Fei Bai. "Generalized Elliptic Curve Digital Signature Chain Based Authentication and Key Agreement Scheme". Advanced Materials Research 108-111 (mayo de 2010): 1503–8. http://dx.doi.org/10.4028/www.scientific.net/amr.108-111.1503.
Texto completoZhang, Yuanyuan y Zhibo Zhai. "An efficient and provably secure key agreement scheme for satellite communication systems". PLOS ONE 16, n.º 4 (26 de abril de 2021): e0250205. http://dx.doi.org/10.1371/journal.pone.0250205.
Texto completoGong, Xiang y Tao Feng. "Lightweight Anonymous Authentication and Key Agreement Protocol Based on CoAP of Internet of Things". Sensors 22, n.º 19 (22 de septiembre de 2022): 7191. http://dx.doi.org/10.3390/s22197191.
Texto completoChandrakar, Preeti y Hari Om. "A Secure Two-Factor Remote User Authentication and Session Key Agreement Scheme". International Journal of Business Data Communications and Networking 12, n.º 2 (julio de 2016): 62–79. http://dx.doi.org/10.4018/ijbdcn.2016070104.
Texto completoZahednejad, Behnam, Huang Teng, Saeed Kosari y Ren Xiaojun. "A Lightweight, Secure Big Data-Based Authentication and Key-Agreement Scheme for IoT with Revocability". International Journal of Intelligent Systems 2023 (29 de abril de 2023): 1–19. http://dx.doi.org/10.1155/2023/9731239.
Texto completoMao, Deming, Ling Zhang, Xiaoyu Li y Dejun Mu. "Trusted Authority Assisted Three-Factor Authentication and Key Agreement Protocol for the Implantable Medical System". Wireless Communications and Mobile Computing 2018 (29 de julio de 2018): 1–16. http://dx.doi.org/10.1155/2018/7579161.
Texto completoAbderrezzak, Sebbah y Kadri Benamar. "A Strong ECC Based on Secure Authentication with Privacy for IoT Concepts". International Journal of Technology Diffusion 13, n.º 1 (1 de enero de 2022): 1–22. http://dx.doi.org/10.4018/ijtd.313643.
Texto completoTesis sobre el tema "Strong Key Agreement Scheme"
Fujdiak, Radek. "Analýza a optimalizace datové komunikace pro telemetrické systémy v energetice". Doctoral thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-358408.
Texto completoTiwari, Mayank. "Fully Resilient Non-Interactive ID-Based Hierarchical Key Agreement". Thesis, 2018. https://etd.iisc.ac.in/handle/2005/4352.
Texto completoTurnip, Togu y 唐天凱. "Anonymous Group Key Agreement Scheme for Mobile Networks". Thesis, 2016. http://ndltd.ncl.edu.tw/handle/97185328987360408418.
Texto completo國立臺灣科技大學
資訊管理系
104
Because of growing demand of the group-oriented applications, the secure and reliable group communication increases popularity in mobile networks. For securing group communications, a number of authenticated group key agreement (AGKA) schemes have been proposed based on certificateless public key cryptography (CL-PKC). AGKA scheme ensures group members to communicate with each other securely over insecure networks. However, the most of the AGKA schemes are implemented using bilinear pairing and without consideration of the user anonymity feature. In this thesis, the author proposed an anonymous certificateless authenticated group key agreement scheme without using bilinear pairing for resource-limited mobile devices due to the heavy computational overhead. The proposed scheme also provides join and leave procedures to enable the dynamic group operations by adopting Huffman key tree in order to minimize the negotiation rounds and reduce computational costs. This thesis analyzed the security of the proposed scheme and the proposed scheme obtains the desired security attributes with anonymity. Moreover, the security of proposed scheme was also evaluated by using BAN logic which shows that each group members generate a fresh, common and secure shared group key. Finally, the proposed scheme has relatively efficient performance in terms of communication and computation overheads than the others existing CL-PKC schemes. Hence, the proposed scheme is suitable to be used for resource-limited mobile devices.
Chen, Hua-Yueh y 陳華嶽. "Key Agreement Scheme for 3G Mobile Communication Systems". Thesis, 2007. http://ndltd.ncl.edu.tw/handle/9z8vyt.
Texto completo國立臺灣科技大學
資訊管理系
95
Communicating and exchanging information with others by using third generation mobile communication (3G) is the future trend. However, the third generation mobile telecommunication system security is only limited to user-to-network or vice versa. It can not provide end-to-end protection. Mutual authentication and session key establishment can be achieved by authenticated key agreement scheme. Unfortunately, we still need to increase some modules to the current 3G system in order to implement the published low-power device key agreement schemes. Hence we use XOR, one-way hash function and one-way functions existing in the current third generation communication system to design key agreement scheme for 3G. We also propose a group key agreement scheme for the application of group communication. Our scheme will satisfy the following properties: (1) Implement on 3G system easily. (2) Achieve authentication and key agreement to ensure confidentiality of conferences. (3) Establish group key. (4) Ensure privacy of conferees’ locations. (5) Detect fake devices and avoid replay attack. (6) Has session key that is of nondisclosure, independence and integrity.
Lin, Zhi-Liang y 林致良. "An Efficient Certificateless Authenticated Tripartite Key Agreement Scheme". Thesis, 2014. http://ndltd.ncl.edu.tw/handle/87511075350141507082.
Texto completo國立中興大學
資訊科學與工程學系
102
The Key agreement protocol allows two or more parties to establish a shared session key by exchanging messages over an open network. In 1976, Diffie and Hellman proposed the first key agreement protocol which enables two parties to establish a shared session key. Such protocol does not provide authentication of the communicating parties and is thus vulnerable to man-in-the-middle attack. In 2000, Joux proposed the first one round tripartite key agreement protocol. In fact, their protocol is also suffering from man-in-the-middle attack. Over the years, different approaches with authentication have been widely proposed to slove the problem. To overcome the drawbacks of managing certificates in traditional public key infrastructure and solving the key escrow problem in ID-based cryptosystem. Al-Riyami and Paterson first invented certificateless public key cryptography in 2003. Later on, Gao et al. proposed the first certificateless authenticated tripartite key agreement protocol. In this thesis, we present an efficient authenticated tripartite key agreement scheme based on certificateless public key cryptography. Our protocol is more efficient than Gao et al.’s, and we also show that the proposed scheme can meet the security requirements.
GONG, JAIN-CHENG y 龔建丞. "An Improved Authenticated Key Agreement Scheme with Smart Card". Thesis, 2017. http://ndltd.ncl.edu.tw/handle/09029784157900512107.
Texto completo中國文化大學
資訊管理學系
105
With the evolution of Network and Information technology, the smart card makes us more convenience in daily life. The remote user and server are often using smart cards for authentication. In order to protect the privacy of users, the security of using smart card are becoming more and more important. In 2015, Chaudhry et al. proposed that Kumari et al.’s scheme has weaknesses, and proposed an improved scheme. They indicate their scheme can against many attack. However, we find that the Chaudhry et al.’s scheme is still with security problem. In 2015, Shi et al. also proposed that Kumari et al.’s other authentication scheme had many security problems, and proposed an improved scheme, but we find that scheme was still insecure. In this paper, we will analyze that weaknesses of Chaudhry et al.’s and Shi et al’s scheme, and improve Chaudhry et al.’s scheme to avoid their security problems. We also apply the security analysis and security comparison and efficiency analysis with other schemes that prove our scheme is secure and can apply it in everyday life.
Hsu, Ming-Huei y 許明暉. "An Efficient Electronic Mail Protocol and Key Agreement Scheme". Thesis, 2009. http://ndltd.ncl.edu.tw/handle/65109319908697682953.
Texto completo朝陽科技大學
資訊工程系碩士班
97
E-mail has become an irreplaceable mean of communication in the era of Internet age. Yet, since the early days, when e-mails were exchanged as normal text files without any safety mechanism, safety and privacy has always been a crucial agenda for e-mail exchanges. This paper, with modern cryptography, would discuss an e-mail protocol for better safety and privacy, as one of the key issues for e-mail security is to assure the identity of the destined recipient. In such a forward secrecy protocol, PGP (pretty Good Privacy) encryption is not included because of its high system demand for calculation capacity, and instead of session keys, passwords play the main part of identity verification; so the protocol discussed here would be suitable for mobile devices. As for the security issue, such protocol would be built on discreet logarithms so that attackers do not have access to the user privacy in the public information. Secondary, there are more and more services that can be obtained from servers with easy access, which means such accesses are opened for attacked, such as user privacy, attacks and hacks on server, and consequently brought the disruption to such services. This paper would discuss an efficient key agreement protocol that requires the user to use password, or finger-print recognition system to obtain mutual authentication with the server, and the session key. For its security measure, this forward-secrecy protocol can resist against stolen-verifier attack, Denial of Service DoS, and known-key attack, so the users can obtain services from servers via the internet securely.
Liu, Jian-You y 劉建佑. "An Anonymous Authentication and Key Agreement Scheme in VANETs". Thesis, 2012. http://ndltd.ncl.edu.tw/handle/14100499819856958404.
Texto completo國立中山大學
資訊工程學系研究所
100
Vehicular ad-hoc network (VANETs) has been a hot research topic in recent years. In this environment, each vehicle can broadcast messages to other vehicles and inform drivers to change their route right away in order to enhance the efficiency of driving and to avoid accidents. Since vehicles communicate through wireless tunnel, many malicious attacks may occur during the transmission of messages. Consequently, ensuring the correctness of receiving messages and verifying the authenticity of the sender is necessary. Besides, we also need to protect the real identities of vehicles from revealing to guarantee the privacy. To satisfy these security properties, many related researches have been proposed. However, they all have some drawbacks. For example: 1. The cost of the certificate management and the exposure problem of the certificate. 2. Waiting for RSU to verify the messages: Once more vehicles need RSU, RSU will have much more overhead and it can’t achieve real-time authentication. In this thesis, we come up with an anonymous authentication and key agreement scheme based on chameleon hashing and ID-based cryptography in the vehicular communication environment. In our scheme, every vehicle can generate many different chameleon hash values to represent itself, and others can prove the ownership of chameleon hash value. Furthermore, unlike other pseudonymous authentication schemes, we also achieve one-to-one private communication via ID-based cryptography. Finally, we not only overcome some problems in previous works but also fulfill some necessary security requirements in vehicular communication environment.
Liao, Yi-Ching y 廖一清. "Improvement on a Remote User Authentication Scheme with Key Agreement". Thesis, 2016. http://ndltd.ncl.edu.tw/handle/80995015652062666555.
Texto completo南華大學
資訊管理學系
104
Recently, Kumari et al. pointed out that Chang et al.’s “Untraceable dynamic-identity-based remote user authentication scheme with verifiable password update” not only has several drawbacks, but also does not provide any session key agreement. Hence, they proposed an improvement with key agreement on the scheme. After cryptanalysis, they confirmed its security properties. However, we determined that the improved scheme still suffers from both anonymity breach and the smart card loss password guessing attack, which are two of the ten basic requirements in a secure identity authentication protocal using smart card, insisted by Liao et al. Therefore, we modified their improvement to include those desired security functionalities, which are significantly important in a user authentication smart card system.
He, Bing-Zhe y 何秉哲. "A Group Key Agreement Scheme with Certificateless and Time-bound Properties". Thesis, 2015. http://ndltd.ncl.edu.tw/handle/7zp5ut.
Texto completoLibros sobre el tema "Strong Key Agreement Scheme"
Dawson, John y Tom Burns. Lowering legal barriers to transitioning mentally disordered offenders into general mental health care. Editado por Alec Buchanan y Lisa Wootton. Oxford University Press, 2017. http://dx.doi.org/10.1093/med/9780198738664.003.0014.
Texto completoDavies, Paul S. JC Smith's The Law of Contract. 3a ed. Oxford University Press, 2021. http://dx.doi.org/10.1093/he/9780198853503.001.0001.
Texto completoDavies, Paul S. JC Smith's The Law of Contract. Oxford University Press, 2018. http://dx.doi.org/10.1093/he/9780198807810.001.0001.
Texto completoTulloch, John y Belinda Middleweek. Actors and Sexual Intimacies. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190244606.003.0010.
Texto completoCloete, Nico, Tracy Bailey y Peter Maassen. Universities and Economic Development in Africa. African Minds, 2011. http://dx.doi.org/10.47622/9781920355807.
Texto completoCapítulos de libros sobre el tema "Strong Key Agreement Scheme"
Wang, Jinlong, Shuai Zhang, Peijian Luo y Xinwei Zhao. "A Strong Security Key Agreement Scheme for Underwater Acoustic Networks". En Lecture Notes in Electrical Engineering, 666–77. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-2287-1_94.
Texto completoMoreno-Fuentes, Francisco Javier. "Migrants’ Access to Social Protection in Spain". En IMISCOE Research Series, 405–20. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-51241-5_27.
Texto completoYoon, Eun-Jun y Kee-Young Yoo. "Biometrics Authenticated Key Agreement Scheme". En Next Generation Information Technologies and Systems, 345–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11780991_32.
Texto completoBobrysheva, Julia y Sergey Zapechnikov. "Post-quantum Group Key Agreement Scheme". En Brain-Inspired Cognitive Architectures for Artificial Intelligence: BICA*AI 2020, 49–55. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-65596-9_7.
Texto completoChen, Hsing-Chung y Chung-Wei Chen. "A Secure Multicast Key Agreement Scheme". En Information and Communication Technology, 275–81. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-24315-3_28.
Texto completoFischlin, Marc. "The Cramer-Shoup Strong-RSA Signature Scheme Revisited". En Public Key Cryptography — PKC 2003, 116–29. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-36288-6_9.
Texto completoLiagkou, Vasiliki, Effie Makri, Paul Spirakis y Yannis Stamatiou. "A Probabilistic Key Agreement Scheme for Sensor Networks without Key Predistribution". En Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 72–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33448-1_11.
Texto completoYu, Yang, Aixin Zhang, Junhua Tang y Haopeng Chen. "A Dynamic Scheme for Authenticated Group Key Agreement Protocol". En Novel Algorithms and Techniques in Telecommunications and Networking, 245–50. Dordrecht: Springer Netherlands, 2009. http://dx.doi.org/10.1007/978-90-481-3662-9_42.
Texto completoSmith, Andrew y Colin Boyd. "An elliptic curve analogue of McCurley's key agreement scheme". En Cryptography and Coding, 150–57. Berlin, Heidelberg: Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/3-540-60693-9_17.
Texto completoYang, Mee Loong, Adnan Al Anbuky y William Liu. "Security of the Multiple-Key Blom’s Key Agreement Scheme for Sensor Networks". En ICT Systems Security and Privacy Protection, 66–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-55415-5_6.
Texto completoActas de conferencias sobre el tema "Strong Key Agreement Scheme"
Lu, Yung-Feng, Po-Hung Lin, Sheng-Shang Ye, Rong-Sheng Wang y Shih-Chun Chou. "A strong authentication with key agreement scheme for web-based collaborative systems". En 2012 International Symposium on Intelligent Signal Processing and Communications Systems (ISPACS 2012). IEEE, 2012. http://dx.doi.org/10.1109/ispacs.2012.6473508.
Texto completoGope, Prosanta, Ruei-Hau Hsu, Jemin Lee y Tony Q. S. Quek. "Energy Efficient Mutual Authentication and Key Agreement Scheme with Strong Anonymity Support for Secure Ubiquitious Roaming Services". En 2016 11th International Conference on Availability, Reliability and Security (ARES ). IEEE, 2016. http://dx.doi.org/10.1109/ares.2016.52.
Texto completoLallemand, Joseph, David Basin y Christoph Sprenger. "Refining Authenticated Key Agreement with Strong Adversaries". En 2017 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, 2017. http://dx.doi.org/10.1109/eurosp.2017.22.
Texto completoOh, Ka-Kyung, Tae-You Lee, Choon-Sung Nam y Dong-Ryeol Shin. "Strong Authentication and Key Agreement Protocol in UMTS". En 2009 Fifth International Joint Conference on INC, IMS and IDC. IEEE, 2009. http://dx.doi.org/10.1109/ncm.2009.196.
Texto completoChan, Chao-Wen y Te-Chih Chiu. "A key agreement based anonymity scheme". En Multimedia Technology (IC-BNMT 2011). IEEE, 2011. http://dx.doi.org/10.1109/icbnmt.2011.6156018.
Texto completoCao, Zhengjun y Lihua Liu. "A Group Key Agreement Scheme Revisited". En 2008 Fourth International Conference on Information Assurance and Security (IAS). IEEE, 2008. http://dx.doi.org/10.1109/ias.2008.13.
Texto completoChang, Chin-Chen y Shih-Yi Lin. "An Improvement on Authenticated Key Agreement Scheme". En The 2007 International Conference on Intelligent Pervasive Computing (IPC 2007). IEEE, 2007. http://dx.doi.org/10.1109/ipc.2007.49.
Texto completoXia, Jingbo, Yu Rongwei y Xiaochuan Ai. "A New Efficient Hierarchical Key Agreement Scheme". En 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC 2009). IEEE, 2009. http://dx.doi.org/10.1109/nswctc.2009.80.
Texto completoLi, Haitao, Shize Guo, Kangfeng Zheng, Zhe Chen y Jun Cui. "Improved Adoptable Scheme for Authentication and Key Agreement". En 2009 International Conference on Management and Service Science (MASS). IEEE, 2009. http://dx.doi.org/10.1109/icmss.2009.5301997.
Texto completoDahai Du, Qiao Li, Zheng Li, Hong Fan, Chengyuan Li y Hua Shao. "A key agreement scheme for avionics communications security". En 2012 IEEE/AIAA 31st Digital Avionics Systems Conference (DASC). IEEE, 2012. http://dx.doi.org/10.1109/dasc.2012.6382414.
Texto completoInformes sobre el tema "Strong Key Agreement Scheme"
Lyzanchuk, Vasyl. COMMUNICATIVE SYNERGY OF UKRAINIAN NATIONAL VALUES IN THE CONTEXT OF THE RUSSIAN HYBRID WAR. Ivan Franko National University of Lviv, febrero de 2021. http://dx.doi.org/10.30970/vjo.2021.49.11077.
Texto completo