Gotowa bibliografia na temat „Strong Key Agreement Scheme”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Strong Key Agreement Scheme”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Strong Key Agreement Scheme"
Alimoradi, Reza. "A new certificateless multiple key agreement scheme". Discrete Mathematics, Algorithms and Applications 09, nr 01 (luty 2017): 1750002. http://dx.doi.org/10.1142/s1793830917500021.
Pełny tekst źródłaSun, Mei, Yuyan Guo, Dongbing Zhang i MingMing Jiang. "Anonymous Authentication and Key Agreement Scheme Combining the Group Key for Vehicular Ad Hoc Networks". Complexity 2021 (4.05.2021): 1–13. http://dx.doi.org/10.1155/2021/5526412.
Pełny tekst źródłaCao, Liling, Mei Liang, Zheng Zhang i Shouqi Cao. "Certificateless Cross-Domain Group Authentication Key Agreement Scheme Based on ECC". Wireless Communications and Mobile Computing 2022 (5.12.2022): 1–16. http://dx.doi.org/10.1155/2022/7519688.
Pełny tekst źródłaZhang, Li Hua, Li Ping Zhang i Er Fei Bai. "Generalized Elliptic Curve Digital Signature Chain Based Authentication and Key Agreement Scheme". Advanced Materials Research 108-111 (maj 2010): 1503–8. http://dx.doi.org/10.4028/www.scientific.net/amr.108-111.1503.
Pełny tekst źródłaZhang, Yuanyuan, i Zhibo Zhai. "An efficient and provably secure key agreement scheme for satellite communication systems". PLOS ONE 16, nr 4 (26.04.2021): e0250205. http://dx.doi.org/10.1371/journal.pone.0250205.
Pełny tekst źródłaGong, Xiang, i Tao Feng. "Lightweight Anonymous Authentication and Key Agreement Protocol Based on CoAP of Internet of Things". Sensors 22, nr 19 (22.09.2022): 7191. http://dx.doi.org/10.3390/s22197191.
Pełny tekst źródłaChandrakar, Preeti, i Hari Om. "A Secure Two-Factor Remote User Authentication and Session Key Agreement Scheme". International Journal of Business Data Communications and Networking 12, nr 2 (lipiec 2016): 62–79. http://dx.doi.org/10.4018/ijbdcn.2016070104.
Pełny tekst źródłaZahednejad, Behnam, Huang Teng, Saeed Kosari i Ren Xiaojun. "A Lightweight, Secure Big Data-Based Authentication and Key-Agreement Scheme for IoT with Revocability". International Journal of Intelligent Systems 2023 (29.04.2023): 1–19. http://dx.doi.org/10.1155/2023/9731239.
Pełny tekst źródłaMao, Deming, Ling Zhang, Xiaoyu Li i Dejun Mu. "Trusted Authority Assisted Three-Factor Authentication and Key Agreement Protocol for the Implantable Medical System". Wireless Communications and Mobile Computing 2018 (29.07.2018): 1–16. http://dx.doi.org/10.1155/2018/7579161.
Pełny tekst źródłaAbderrezzak, Sebbah, i Kadri Benamar. "A Strong ECC Based on Secure Authentication with Privacy for IoT Concepts". International Journal of Technology Diffusion 13, nr 1 (1.01.2022): 1–22. http://dx.doi.org/10.4018/ijtd.313643.
Pełny tekst źródłaRozprawy doktorskie na temat "Strong Key Agreement Scheme"
Fujdiak, Radek. "Analýza a optimalizace datové komunikace pro telemetrické systémy v energetice". Doctoral thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-358408.
Pełny tekst źródłaTiwari, Mayank. "Fully Resilient Non-Interactive ID-Based Hierarchical Key Agreement". Thesis, 2018. https://etd.iisc.ac.in/handle/2005/4352.
Pełny tekst źródłaTurnip, Togu, i 唐天凱. "Anonymous Group Key Agreement Scheme for Mobile Networks". Thesis, 2016. http://ndltd.ncl.edu.tw/handle/97185328987360408418.
Pełny tekst źródła國立臺灣科技大學
資訊管理系
104
Because of growing demand of the group-oriented applications, the secure and reliable group communication increases popularity in mobile networks. For securing group communications, a number of authenticated group key agreement (AGKA) schemes have been proposed based on certificateless public key cryptography (CL-PKC). AGKA scheme ensures group members to communicate with each other securely over insecure networks. However, the most of the AGKA schemes are implemented using bilinear pairing and without consideration of the user anonymity feature. In this thesis, the author proposed an anonymous certificateless authenticated group key agreement scheme without using bilinear pairing for resource-limited mobile devices due to the heavy computational overhead. The proposed scheme also provides join and leave procedures to enable the dynamic group operations by adopting Huffman key tree in order to minimize the negotiation rounds and reduce computational costs. This thesis analyzed the security of the proposed scheme and the proposed scheme obtains the desired security attributes with anonymity. Moreover, the security of proposed scheme was also evaluated by using BAN logic which shows that each group members generate a fresh, common and secure shared group key. Finally, the proposed scheme has relatively efficient performance in terms of communication and computation overheads than the others existing CL-PKC schemes. Hence, the proposed scheme is suitable to be used for resource-limited mobile devices.
Chen, Hua-Yueh, i 陳華嶽. "Key Agreement Scheme for 3G Mobile Communication Systems". Thesis, 2007. http://ndltd.ncl.edu.tw/handle/9z8vyt.
Pełny tekst źródła國立臺灣科技大學
資訊管理系
95
Communicating and exchanging information with others by using third generation mobile communication (3G) is the future trend. However, the third generation mobile telecommunication system security is only limited to user-to-network or vice versa. It can not provide end-to-end protection. Mutual authentication and session key establishment can be achieved by authenticated key agreement scheme. Unfortunately, we still need to increase some modules to the current 3G system in order to implement the published low-power device key agreement schemes. Hence we use XOR, one-way hash function and one-way functions existing in the current third generation communication system to design key agreement scheme for 3G. We also propose a group key agreement scheme for the application of group communication. Our scheme will satisfy the following properties: (1) Implement on 3G system easily. (2) Achieve authentication and key agreement to ensure confidentiality of conferences. (3) Establish group key. (4) Ensure privacy of conferees’ locations. (5) Detect fake devices and avoid replay attack. (6) Has session key that is of nondisclosure, independence and integrity.
Lin, Zhi-Liang, i 林致良. "An Efficient Certificateless Authenticated Tripartite Key Agreement Scheme". Thesis, 2014. http://ndltd.ncl.edu.tw/handle/87511075350141507082.
Pełny tekst źródła國立中興大學
資訊科學與工程學系
102
The Key agreement protocol allows two or more parties to establish a shared session key by exchanging messages over an open network. In 1976, Diffie and Hellman proposed the first key agreement protocol which enables two parties to establish a shared session key. Such protocol does not provide authentication of the communicating parties and is thus vulnerable to man-in-the-middle attack. In 2000, Joux proposed the first one round tripartite key agreement protocol. In fact, their protocol is also suffering from man-in-the-middle attack. Over the years, different approaches with authentication have been widely proposed to slove the problem. To overcome the drawbacks of managing certificates in traditional public key infrastructure and solving the key escrow problem in ID-based cryptosystem. Al-Riyami and Paterson first invented certificateless public key cryptography in 2003. Later on, Gao et al. proposed the first certificateless authenticated tripartite key agreement protocol. In this thesis, we present an efficient authenticated tripartite key agreement scheme based on certificateless public key cryptography. Our protocol is more efficient than Gao et al.’s, and we also show that the proposed scheme can meet the security requirements.
GONG, JAIN-CHENG, i 龔建丞. "An Improved Authenticated Key Agreement Scheme with Smart Card". Thesis, 2017. http://ndltd.ncl.edu.tw/handle/09029784157900512107.
Pełny tekst źródła中國文化大學
資訊管理學系
105
With the evolution of Network and Information technology, the smart card makes us more convenience in daily life. The remote user and server are often using smart cards for authentication. In order to protect the privacy of users, the security of using smart card are becoming more and more important. In 2015, Chaudhry et al. proposed that Kumari et al.’s scheme has weaknesses, and proposed an improved scheme. They indicate their scheme can against many attack. However, we find that the Chaudhry et al.’s scheme is still with security problem. In 2015, Shi et al. also proposed that Kumari et al.’s other authentication scheme had many security problems, and proposed an improved scheme, but we find that scheme was still insecure. In this paper, we will analyze that weaknesses of Chaudhry et al.’s and Shi et al’s scheme, and improve Chaudhry et al.’s scheme to avoid their security problems. We also apply the security analysis and security comparison and efficiency analysis with other schemes that prove our scheme is secure and can apply it in everyday life.
Hsu, Ming-Huei, i 許明暉. "An Efficient Electronic Mail Protocol and Key Agreement Scheme". Thesis, 2009. http://ndltd.ncl.edu.tw/handle/65109319908697682953.
Pełny tekst źródła朝陽科技大學
資訊工程系碩士班
97
E-mail has become an irreplaceable mean of communication in the era of Internet age. Yet, since the early days, when e-mails were exchanged as normal text files without any safety mechanism, safety and privacy has always been a crucial agenda for e-mail exchanges. This paper, with modern cryptography, would discuss an e-mail protocol for better safety and privacy, as one of the key issues for e-mail security is to assure the identity of the destined recipient. In such a forward secrecy protocol, PGP (pretty Good Privacy) encryption is not included because of its high system demand for calculation capacity, and instead of session keys, passwords play the main part of identity verification; so the protocol discussed here would be suitable for mobile devices. As for the security issue, such protocol would be built on discreet logarithms so that attackers do not have access to the user privacy in the public information. Secondary, there are more and more services that can be obtained from servers with easy access, which means such accesses are opened for attacked, such as user privacy, attacks and hacks on server, and consequently brought the disruption to such services. This paper would discuss an efficient key agreement protocol that requires the user to use password, or finger-print recognition system to obtain mutual authentication with the server, and the session key. For its security measure, this forward-secrecy protocol can resist against stolen-verifier attack, Denial of Service DoS, and known-key attack, so the users can obtain services from servers via the internet securely.
Liu, Jian-You, i 劉建佑. "An Anonymous Authentication and Key Agreement Scheme in VANETs". Thesis, 2012. http://ndltd.ncl.edu.tw/handle/14100499819856958404.
Pełny tekst źródła國立中山大學
資訊工程學系研究所
100
Vehicular ad-hoc network (VANETs) has been a hot research topic in recent years. In this environment, each vehicle can broadcast messages to other vehicles and inform drivers to change their route right away in order to enhance the efficiency of driving and to avoid accidents. Since vehicles communicate through wireless tunnel, many malicious attacks may occur during the transmission of messages. Consequently, ensuring the correctness of receiving messages and verifying the authenticity of the sender is necessary. Besides, we also need to protect the real identities of vehicles from revealing to guarantee the privacy. To satisfy these security properties, many related researches have been proposed. However, they all have some drawbacks. For example: 1. The cost of the certificate management and the exposure problem of the certificate. 2. Waiting for RSU to verify the messages: Once more vehicles need RSU, RSU will have much more overhead and it can’t achieve real-time authentication. In this thesis, we come up with an anonymous authentication and key agreement scheme based on chameleon hashing and ID-based cryptography in the vehicular communication environment. In our scheme, every vehicle can generate many different chameleon hash values to represent itself, and others can prove the ownership of chameleon hash value. Furthermore, unlike other pseudonymous authentication schemes, we also achieve one-to-one private communication via ID-based cryptography. Finally, we not only overcome some problems in previous works but also fulfill some necessary security requirements in vehicular communication environment.
Liao, Yi-Ching, i 廖一清. "Improvement on a Remote User Authentication Scheme with Key Agreement". Thesis, 2016. http://ndltd.ncl.edu.tw/handle/80995015652062666555.
Pełny tekst źródła南華大學
資訊管理學系
104
Recently, Kumari et al. pointed out that Chang et al.’s “Untraceable dynamic-identity-based remote user authentication scheme with verifiable password update” not only has several drawbacks, but also does not provide any session key agreement. Hence, they proposed an improvement with key agreement on the scheme. After cryptanalysis, they confirmed its security properties. However, we determined that the improved scheme still suffers from both anonymity breach and the smart card loss password guessing attack, which are two of the ten basic requirements in a secure identity authentication protocal using smart card, insisted by Liao et al. Therefore, we modified their improvement to include those desired security functionalities, which are significantly important in a user authentication smart card system.
He, Bing-Zhe, i 何秉哲. "A Group Key Agreement Scheme with Certificateless and Time-bound Properties". Thesis, 2015. http://ndltd.ncl.edu.tw/handle/7zp5ut.
Pełny tekst źródłaKsiążki na temat "Strong Key Agreement Scheme"
Dawson, John, i Tom Burns. Lowering legal barriers to transitioning mentally disordered offenders into general mental health care. Redaktorzy Alec Buchanan i Lisa Wootton. Oxford University Press, 2017. http://dx.doi.org/10.1093/med/9780198738664.003.0014.
Pełny tekst źródłaDavies, Paul S. JC Smith's The Law of Contract. Wyd. 3. Oxford University Press, 2021. http://dx.doi.org/10.1093/he/9780198853503.001.0001.
Pełny tekst źródłaDavies, Paul S. JC Smith's The Law of Contract. Oxford University Press, 2018. http://dx.doi.org/10.1093/he/9780198807810.001.0001.
Pełny tekst źródłaTulloch, John, i Belinda Middleweek. Actors and Sexual Intimacies. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190244606.003.0010.
Pełny tekst źródłaCloete, Nico, Tracy Bailey i Peter Maassen. Universities and Economic Development in Africa. African Minds, 2011. http://dx.doi.org/10.47622/9781920355807.
Pełny tekst źródłaCzęści książek na temat "Strong Key Agreement Scheme"
Wang, Jinlong, Shuai Zhang, Peijian Luo i Xinwei Zhao. "A Strong Security Key Agreement Scheme for Underwater Acoustic Networks". W Lecture Notes in Electrical Engineering, 666–77. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-2287-1_94.
Pełny tekst źródłaMoreno-Fuentes, Francisco Javier. "Migrants’ Access to Social Protection in Spain". W IMISCOE Research Series, 405–20. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-51241-5_27.
Pełny tekst źródłaYoon, Eun-Jun, i Kee-Young Yoo. "Biometrics Authenticated Key Agreement Scheme". W Next Generation Information Technologies and Systems, 345–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11780991_32.
Pełny tekst źródłaBobrysheva, Julia, i Sergey Zapechnikov. "Post-quantum Group Key Agreement Scheme". W Brain-Inspired Cognitive Architectures for Artificial Intelligence: BICA*AI 2020, 49–55. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-65596-9_7.
Pełny tekst źródłaChen, Hsing-Chung, i Chung-Wei Chen. "A Secure Multicast Key Agreement Scheme". W Information and Communication Technology, 275–81. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-24315-3_28.
Pełny tekst źródłaFischlin, Marc. "The Cramer-Shoup Strong-RSA Signature Scheme Revisited". W Public Key Cryptography — PKC 2003, 116–29. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-36288-6_9.
Pełny tekst źródłaLiagkou, Vasiliki, Effie Makri, Paul Spirakis i Yannis Stamatiou. "A Probabilistic Key Agreement Scheme for Sensor Networks without Key Predistribution". W Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 72–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33448-1_11.
Pełny tekst źródłaYu, Yang, Aixin Zhang, Junhua Tang i Haopeng Chen. "A Dynamic Scheme for Authenticated Group Key Agreement Protocol". W Novel Algorithms and Techniques in Telecommunications and Networking, 245–50. Dordrecht: Springer Netherlands, 2009. http://dx.doi.org/10.1007/978-90-481-3662-9_42.
Pełny tekst źródłaSmith, Andrew, i Colin Boyd. "An elliptic curve analogue of McCurley's key agreement scheme". W Cryptography and Coding, 150–57. Berlin, Heidelberg: Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/3-540-60693-9_17.
Pełny tekst źródłaYang, Mee Loong, Adnan Al Anbuky i William Liu. "Security of the Multiple-Key Blom’s Key Agreement Scheme for Sensor Networks". W ICT Systems Security and Privacy Protection, 66–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-55415-5_6.
Pełny tekst źródłaStreszczenia konferencji na temat "Strong Key Agreement Scheme"
Lu, Yung-Feng, Po-Hung Lin, Sheng-Shang Ye, Rong-Sheng Wang i Shih-Chun Chou. "A strong authentication with key agreement scheme for web-based collaborative systems". W 2012 International Symposium on Intelligent Signal Processing and Communications Systems (ISPACS 2012). IEEE, 2012. http://dx.doi.org/10.1109/ispacs.2012.6473508.
Pełny tekst źródłaGope, Prosanta, Ruei-Hau Hsu, Jemin Lee i Tony Q. S. Quek. "Energy Efficient Mutual Authentication and Key Agreement Scheme with Strong Anonymity Support for Secure Ubiquitious Roaming Services". W 2016 11th International Conference on Availability, Reliability and Security (ARES ). IEEE, 2016. http://dx.doi.org/10.1109/ares.2016.52.
Pełny tekst źródłaLallemand, Joseph, David Basin i Christoph Sprenger. "Refining Authenticated Key Agreement with Strong Adversaries". W 2017 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, 2017. http://dx.doi.org/10.1109/eurosp.2017.22.
Pełny tekst źródłaOh, Ka-Kyung, Tae-You Lee, Choon-Sung Nam i Dong-Ryeol Shin. "Strong Authentication and Key Agreement Protocol in UMTS". W 2009 Fifth International Joint Conference on INC, IMS and IDC. IEEE, 2009. http://dx.doi.org/10.1109/ncm.2009.196.
Pełny tekst źródłaChan, Chao-Wen, i Te-Chih Chiu. "A key agreement based anonymity scheme". W Multimedia Technology (IC-BNMT 2011). IEEE, 2011. http://dx.doi.org/10.1109/icbnmt.2011.6156018.
Pełny tekst źródłaCao, Zhengjun, i Lihua Liu. "A Group Key Agreement Scheme Revisited". W 2008 Fourth International Conference on Information Assurance and Security (IAS). IEEE, 2008. http://dx.doi.org/10.1109/ias.2008.13.
Pełny tekst źródłaChang, Chin-Chen, i Shih-Yi Lin. "An Improvement on Authenticated Key Agreement Scheme". W The 2007 International Conference on Intelligent Pervasive Computing (IPC 2007). IEEE, 2007. http://dx.doi.org/10.1109/ipc.2007.49.
Pełny tekst źródłaXia, Jingbo, Yu Rongwei i Xiaochuan Ai. "A New Efficient Hierarchical Key Agreement Scheme". W 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC 2009). IEEE, 2009. http://dx.doi.org/10.1109/nswctc.2009.80.
Pełny tekst źródłaLi, Haitao, Shize Guo, Kangfeng Zheng, Zhe Chen i Jun Cui. "Improved Adoptable Scheme for Authentication and Key Agreement". W 2009 International Conference on Management and Service Science (MASS). IEEE, 2009. http://dx.doi.org/10.1109/icmss.2009.5301997.
Pełny tekst źródłaDahai Du, Qiao Li, Zheng Li, Hong Fan, Chengyuan Li i Hua Shao. "A key agreement scheme for avionics communications security". W 2012 IEEE/AIAA 31st Digital Avionics Systems Conference (DASC). IEEE, 2012. http://dx.doi.org/10.1109/dasc.2012.6382414.
Pełny tekst źródłaRaporty organizacyjne na temat "Strong Key Agreement Scheme"
Lyzanchuk, Vasyl. COMMUNICATIVE SYNERGY OF UKRAINIAN NATIONAL VALUES IN THE CONTEXT OF THE RUSSIAN HYBRID WAR. Ivan Franko National University of Lviv, luty 2021. http://dx.doi.org/10.30970/vjo.2021.49.11077.
Pełny tekst źródła