搜索结果: 1-15 共查到“军事学 Key agreement scheme”相关记录15条 . 查询时间(0.109 秒)
A Secure User Authentication and Key Agreement Scheme for HWSN Tailored for the Internet of Things Environment
Internet of Things Wireless Sensor Networks Vulnerability
2017/6/22
Internet of things (IOT) is the term used to describe a world in which the things interact with other things through internet connection or communication means, share the information together and or p...
Security Enhanced Anonymous Multi-Server Authenticated Key Agreement Scheme using Smart Card and Biometrics
Key agreement scheme Anonymous multi-server Securty
2016/1/26
Chuang and Chen propose an anonymous multi server authenticated
key agreement scheme based on trust computing using smart
card, password, and biometrics. Chuang and Chen say that this scheme
not on...
Comments on a novel user authentication and key agreement scheme
user authentication key agreement client-server environment
2016/1/25
In 2013, Sun et al. showed that the related works' authentication schemes proposed by
[2-7] are vulnerable to an insider attack and fail to provide mutual authentication.
These two attacks can be su...
On the Security of an Efficient Group Key Agreement Scheme for MANETs
Key agreement MANET Cryptanalysis
2016/1/3
Yang et al. have proposed an efficient group key agreement scheme for Mobile
Adhoc Networks. The scheme is efficient as only one bilinear computation
is required for group members to obtain the sess...
An efficient certificateless authenticated key agreement scheme
Certificateless cryptography Authenticated key agreement Provable security Bilinear pairings Elliptic curve
2012/3/26
Due to avoiding the key escrow problem in the identity-based cryptosystem, certificateless public key cryptosystem (CLPKC) has received a significant attention. As an important part of the CLPKC, the ...
Cryptanalysis and Security Enhancement of an Advanced Authentication Scheme using Smart Cards, and a Key Agreement Scheme for Two-Party Communication
cryptographic protocols / smart cards cryptanalysis key management
2012/3/29
In this work we consider two protocols for performing cryptanalysis and security enhancement. The first one by Song, is a password authentication scheme based on smart cards. We note that this scheme ...
Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme
cryptographic protocols
2012/3/26
In 2010, Yoon et al. proposed a robust biometrics- based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem. In this letter, however, we show that Yoo...
Security flaws in a biometrics-based multi-server authentication with key agreement scheme
Authentication Key agreement Masquerade attack Privileged insider attack
2011/7/25
Recently, Yoon et al. proposed an efficient biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem (ECC) for multi-server communication e...
Security flaws in a biometrics-based multi-server authentication with key agreement scheme
Authentication Key agreement Masquerade attack Privileged insider attack Elliptic curve cryptosystem Smart card
2012/3/27
Recently, Yoon et al. proposed an efficient biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem (ECC) for multi-server communication e...
An efficient certificateless two-party authenticated key agreement scheme from pairings
Certificateless cryptography Authenticated key agreement Provable
2011/3/11
Key agreement (KA) allows two or more users to negotiate a secret
session key among them over an open network. Authenticated key agreement
(AKA) is a KA protocol enhanced to prevent active attacks. ...
An efficient certificateless two-party authenticated key agreement scheme from pairings
Certificateless cryptography Authenticated key agreement Provable security Bilinear pairings Elliptic curve
2012/3/29
Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to prevent active attacks. AK...
Cryptanalysis and Security Enhancement of an Advanced Authentication Scheme using Smart Cards, and a Key Agreement Scheme for Two-Party Communication
smart cards cryptanalysis key management
2011/2/23
In this work we consider two protocols for performing cryptanalysis and security enhancement. The first one by Song, is a password authentication scheme based on smart cards. We note that this scheme ...
Practical remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
ID-based mutual authentication key agreement
2009/11/18
Most recently, Yang et al proposed an ID-based remote mutual authentication with
key agreement scheme for mobile devices on elliptic curve cryptosystem in journal of
Computer and Security. In this p...
An Improved ID-based Authenticated Group Key Agreement Scheme
Authenticated group key agreement Bilinear pairings Identity-based cryptography
2009/4/10
Authenticated group key agreement problem is important in many modern collaborative and distributed applications. There are two ID-based authenticated group key agreement schemes have been proposed by...
Attacks on Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement Scheme for Low-Power Mobile Devices
Group key agreement key authentication forward secrecy
2009/3/27
In this paper, we show that Bresson-Chevassut-Essiari-Pointcheval's group key
agreement scheme does not meet the main security properties: implicit key authentication,
forward secrecy, and known key...