• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 162
Next 10 →

An elliptic curve cryptography based authentication and key agreement protocol for wireless communication

by M. Aydos, B. Sunar, C. K. Koc - In 2nd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications Symposium on Information Theory , 1998
"... We propose an authentication and key agreement protocol for wireless communication based on elliptic curve cryptographic techniques. The proposed protocol requires signi cantly less bandwidth than the Aziz-Di e and Beller-Chang-Yacobi protocols, and furthermore, it has lower computational burden and ..."
Abstract - Cited by 27 (4 self) - Add to MetaCart
We propose an authentication and key agreement protocol for wireless communication based on elliptic curve cryptographic techniques. The proposed protocol requires signi cantly less bandwidth than the Aziz-Di e and Beller-Chang-Yacobi protocols, and furthermore, it has lower computational burden

SAS-Based Authenticated Key Agreement

by Sylvain Pasini, Serge Vaudenay - In International Conference on Theory and Practice of Public-Key Cryptography (PKC , 2006
"... Abstract. Key agreement protocols are frequently based on the Diffie-Hellman protocol but require authenticating the protocol messages in two ways. This can be made by a cross-authentication protocol. Such protocols, based on the assumption that a channel which can authenticate short strings is avai ..."
Abstract - Cited by 31 (1 self) - Add to MetaCart
generic construction (e.g. in the standard model) at the price of an extra move. We discuss applications such as secure peer-to-peer VoIP. 1 The SAS-Based Authenticated Key Agreement Problem Secure communication channels are usually set up by authenticated key agreement protocols. This can be performed

A cocktail protocol with the authentication and key agreement on

by Hsia-hung Ou, Min-shiang Hwang, Jinn-ke Jan - the UMTS,” J. Syst. Softw , 2010
"... Agreement on the UMTS At present, the Universal Mobile Telecommunications System (UMTS) is very popular in most parts of the world. It is a third-generation mobile communication technique known for its ability to conduct user authentication and for its security of communication with the use of Authe ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
of Authentication and Key Agreement (AKA) protocol. A mobile station (MS), a service network (SN) and a home environment (HE) use the protocol to authenticate each other and make an agreement with a session key. With the UMTS-AKA protocol standard, all authentication vectors (AV) produced by the HE are transferred

Authentication and Key Agreement Protocols Preserving Anonymity

by Kumar Mangipudi, Rajendra Katti, Huirong Fu, Corresponding Huirong , 2005
"... Anonymity is a very important security feature in addition to authentication and key agreement features in communication protocols. In this paper, we propose two authentication and key agreement (AKA) protocols: the AKA protocol with user anonymity (UAP) and the AKA protocol with user and server ano ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Anonymity is a very important security feature in addition to authentication and key agreement features in communication protocols. In this paper, we propose two authentication and key agreement (AKA) protocols: the AKA protocol with user anonymity (UAP) and the AKA protocol with user and server

Security analysis and enhancements of 3GPP authentication and key agreement protocol

by Muxiang Zhang, Yuguang Fang, Senior Member - return “OK” – if NET.pci = 4 and x = allocate||pc //start TMSI Allocation • TMSIin ← TMSI.Gen(p) • COUNTER-C← COUNTER-C.Gen(STARTi) • STARTi ← START.Update(STARTi,COUNTER-C) • FRESH← FRESH.Gen(k) • KEYSTREAM← h8CKi(COUNTER-C,BEARER, 1, |m|) • cTMSI ← KEYS , 2005
"... Abstract—This paper analyzes the authentication and key agreement protocol adopted by Universal Mobile Telecommunica-tion System (UMTS), an emerging standard for third-generation (3G) wireless communications. The protocol, known as 3GPP AKA, is based on the security framework in GSM and provides sig ..."
Abstract - Cited by 32 (0 self) - Add to MetaCart
Abstract—This paper analyzes the authentication and key agreement protocol adopted by Universal Mobile Telecommunica-tion System (UMTS), an emerging standard for third-generation (3G) wireless communications. The protocol, known as 3GPP AKA, is based on the security framework in GSM and provides

Tinypk: securing sensor networks with public key technology

by Ronald Watro, Derrick Kong, Sue-fen Cuti, Charles Gardiner, Charles Lynn, Peter Kruus - In SASN ’04: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks , 2004
"... Wireless networks of miniaturized, low-power sensor/actuator devices are poised to become widely used in commercial and military environments. The communication security problems for these networks are exacerbated by the limited power and energy of the sensor devices. In this paper, we describe the ..."
Abstract - Cited by 151 (0 self) - Add to MetaCart
the design and implementation of public-key-(PK)-based protocols that allow authentication and key agreement between a sensor network and a third party as well as between two sensor networks. Our work is novel in that PK technology was commonly believed to be too inefficient for use on low-power devices

Authenticated Group Key Agreement against DoS in Heterogeneous Wireless Networks

by Joseph Chee, Ming Teo, Jim Mee Ng
"... Abstract — Heterogeneous wireless networks (HWNs) are gaining popularity due to its convenience for mobile users to be connected to the network even when “on the move”. Group key agreement (GKA) protocols are used to secure group communications in these networks. However, most of the GKA protocols i ..."
Abstract - Add to MetaCart
Abstract — Heterogeneous wireless networks (HWNs) are gaining popularity due to its convenience for mobile users to be connected to the network even when “on the move”. Group key agreement (GKA) protocols are used to secure group communications in these networks. However, most of the GKA protocols

Provably-Secure Enhancement on 3GPP Authentication and Key Agreement Protocol

by Muxiang Zhang , 2003
"... This paper analyses the authentication and key agreement protocol adopted by Universal Mobile Telecommunication System (UMTS), an emerging standard for third generation (3G) wireless communications. The protocol, known as 3GPP AKA, is based on the security framework of GSM and provides significant e ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
This paper analyses the authentication and key agreement protocol adopted by Universal Mobile Telecommunication System (UMTS), an emerging standard for third generation (3G) wireless communications. The protocol, known as 3GPP AKA, is based on the security framework of GSM and provides significant

Authenticated Group Key Agreement Protocols for Ad hoc Wireless Networks

by Ahmed Abdel-hafez, Ali Miri, Luis Orozco-barbosa , 2005
"... The lack of fixed infrastructure, both physical and organizational, and the highly dynamic nature of ad hoc networks, presents a major challenge in providing secure, authenticated communication for these networks. Traditional key management solutions reported in the literature lack both the flexibil ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
the flexibility and robustness required to cope with the dynamic nature of ad hoc networks. In this paper, we propose two different n-party authenticated key agreement protocols enabling authorized nodes to generate their own session keys. The first protocol introduces a solution based on clustering techniques

Mutual authentication and key exchange protocols for roaming services in wireless mobile networks

by Yixin Jiang, Chuang Lin, Senior Member, Xuemin (sherman Shen, Senior Member, Minghui Shi - IEEE Transactions on Wireless Communications , 2006
"... Abstract — Two novel mutual authentication and key exchange protocols with anonymity are proposed for different roaming scenarios in the global mobility network. The new features in the proposed protocols include identity anonymity and one-time session key renewal. Identity anonymity protects mobile ..."
Abstract - Cited by 19 (6 self) - Add to MetaCart
Abstract — Two novel mutual authentication and key exchange protocols with anonymity are proposed for different roaming scenarios in the global mobility network. The new features in the proposed protocols include identity anonymity and one-time session key renewal. Identity anonymity protects
Next 10 →
Results 1 - 10 of 162
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University