Results 1 - 10
of
162
An elliptic curve cryptography based authentication and key agreement protocol for wireless communication
- In 2nd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications Symposium on Information Theory
, 1998
"... We propose an authentication and key agreement protocol for wireless communication based on elliptic curve cryptographic techniques. The proposed protocol requires signi cantly less bandwidth than the Aziz-Di e and Beller-Chang-Yacobi protocols, and furthermore, it has lower computational burden and ..."
Abstract
-
Cited by 27 (4 self)
- Add to MetaCart
We propose an authentication and key agreement protocol for wireless communication based on elliptic curve cryptographic techniques. The proposed protocol requires signi cantly less bandwidth than the Aziz-Di e and Beller-Chang-Yacobi protocols, and furthermore, it has lower computational burden
SAS-Based Authenticated Key Agreement
- In International Conference on Theory and Practice of Public-Key Cryptography (PKC
, 2006
"... Abstract. Key agreement protocols are frequently based on the Diffie-Hellman protocol but require authenticating the protocol messages in two ways. This can be made by a cross-authentication protocol. Such protocols, based on the assumption that a channel which can authenticate short strings is avai ..."
Abstract
-
Cited by 31 (1 self)
- Add to MetaCart
generic construction (e.g. in the standard model) at the price of an extra move. We discuss applications such as secure peer-to-peer VoIP. 1 The SAS-Based Authenticated Key Agreement Problem Secure communication channels are usually set up by authenticated key agreement protocols. This can be performed
A cocktail protocol with the authentication and key agreement on
- the UMTS,” J. Syst. Softw
, 2010
"... Agreement on the UMTS At present, the Universal Mobile Telecommunications System (UMTS) is very popular in most parts of the world. It is a third-generation mobile communication technique known for its ability to conduct user authentication and for its security of communication with the use of Authe ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
of Authentication and Key Agreement (AKA) protocol. A mobile station (MS), a service network (SN) and a home environment (HE) use the protocol to authenticate each other and make an agreement with a session key. With the UMTS-AKA protocol standard, all authentication vectors (AV) produced by the HE are transferred
Authentication and Key Agreement Protocols Preserving Anonymity
, 2005
"... Anonymity is a very important security feature in addition to authentication and key agreement features in communication protocols. In this paper, we propose two authentication and key agreement (AKA) protocols: the AKA protocol with user anonymity (UAP) and the AKA protocol with user and server ano ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
Anonymity is a very important security feature in addition to authentication and key agreement features in communication protocols. In this paper, we propose two authentication and key agreement (AKA) protocols: the AKA protocol with user anonymity (UAP) and the AKA protocol with user and server
Security analysis and enhancements of 3GPP authentication and key agreement protocol
- return “OK” – if NET.pci = 4 and x = allocate||pc //start TMSI Allocation • TMSIin ← TMSI.Gen(p) • COUNTER-C← COUNTER-C.Gen(STARTi) • STARTi ← START.Update(STARTi,COUNTER-C) • FRESH← FRESH.Gen(k) • KEYSTREAM← h8CKi(COUNTER-C,BEARER, 1, |m|) • cTMSI ← KEYS
, 2005
"... Abstract—This paper analyzes the authentication and key agreement protocol adopted by Universal Mobile Telecommunica-tion System (UMTS), an emerging standard for third-generation (3G) wireless communications. The protocol, known as 3GPP AKA, is based on the security framework in GSM and provides sig ..."
Abstract
-
Cited by 32 (0 self)
- Add to MetaCart
Abstract—This paper analyzes the authentication and key agreement protocol adopted by Universal Mobile Telecommunica-tion System (UMTS), an emerging standard for third-generation (3G) wireless communications. The protocol, known as 3GPP AKA, is based on the security framework in GSM and provides
Tinypk: securing sensor networks with public key technology
- In SASN ’04: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks
, 2004
"... Wireless networks of miniaturized, low-power sensor/actuator devices are poised to become widely used in commercial and military environments. The communication security problems for these networks are exacerbated by the limited power and energy of the sensor devices. In this paper, we describe the ..."
Abstract
-
Cited by 151 (0 self)
- Add to MetaCart
the design and implementation of public-key-(PK)-based protocols that allow authentication and key agreement between a sensor network and a third party as well as between two sensor networks. Our work is novel in that PK technology was commonly believed to be too inefficient for use on low-power devices
Authenticated Group Key Agreement against DoS in Heterogeneous Wireless Networks
"... Abstract — Heterogeneous wireless networks (HWNs) are gaining popularity due to its convenience for mobile users to be connected to the network even when “on the move”. Group key agreement (GKA) protocols are used to secure group communications in these networks. However, most of the GKA protocols i ..."
Abstract
- Add to MetaCart
Abstract — Heterogeneous wireless networks (HWNs) are gaining popularity due to its convenience for mobile users to be connected to the network even when “on the move”. Group key agreement (GKA) protocols are used to secure group communications in these networks. However, most of the GKA protocols
Provably-Secure Enhancement on 3GPP Authentication and Key Agreement Protocol
, 2003
"... This paper analyses the authentication and key agreement protocol adopted by Universal Mobile Telecommunication System (UMTS), an emerging standard for third generation (3G) wireless communications. The protocol, known as 3GPP AKA, is based on the security framework of GSM and provides significant e ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
This paper analyses the authentication and key agreement protocol adopted by Universal Mobile Telecommunication System (UMTS), an emerging standard for third generation (3G) wireless communications. The protocol, known as 3GPP AKA, is based on the security framework of GSM and provides significant
Authenticated Group Key Agreement Protocols for Ad hoc Wireless Networks
, 2005
"... The lack of fixed infrastructure, both physical and organizational, and the highly dynamic nature of ad hoc networks, presents a major challenge in providing secure, authenticated communication for these networks. Traditional key management solutions reported in the literature lack both the flexibil ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
the flexibility and robustness required to cope with the dynamic nature of ad hoc networks. In this paper, we propose two different n-party authenticated key agreement protocols enabling authorized nodes to generate their own session keys. The first protocol introduces a solution based on clustering techniques
Mutual authentication and key exchange protocols for roaming services in wireless mobile networks
- IEEE Transactions on Wireless Communications
, 2006
"... Abstract — Two novel mutual authentication and key exchange protocols with anonymity are proposed for different roaming scenarios in the global mobility network. The new features in the proposed protocols include identity anonymity and one-time session key renewal. Identity anonymity protects mobile ..."
Abstract
-
Cited by 19 (6 self)
- Add to MetaCart
Abstract — Two novel mutual authentication and key exchange protocols with anonymity are proposed for different roaming scenarios in the global mobility network. The new features in the proposed protocols include identity anonymity and one-time session key renewal. Identity anonymity protects
Results 1 - 10
of
162