Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks
DOI10.1016/J.INS.2007.06.002zbMATH Open1126.68012OpenAlexW2080234450MaRDI QIDQ2456502FDOQ2456502
Junghyun Nam, Ung Mo Kim, Juryon Paik, Dongho Won
Publication date: 18 October 2007
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2007.06.002
provable securitymobile devicesAuthenticated group key exchangedecisional Diffie-Hellman assumptionintegrated wired and wireless networks
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Network protocols (68M12)
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- Probabilistic encryption
- Security arguments for digital signatures and blind signatures
- New directions in cryptography
- A conference key distribution system
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Foundations of Cryptography
- Information and Communications Security
- Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks
- Public Key Cryptography – PKC 2004
- Round-Optimal Contributory Conference Key Agreement
- Advances in Cryptology - CRYPTO 2003
- Progress in Cryptology - INDOCRYPT 2003
- Constant-Round Authenticated Group Key Exchange for Dynamic Groups
- Public Key Cryptography - PKC 2006
- Public Key Cryptography - PKC 2005
- Security weakness in a three-party pairing-based protocol for password authenticated key exchange
- Cryptanalysis of tripartite and multi-party authenticated key agreement protocols
- A one round protocol for tripartite Diffie-Hellman
- Errors in Computational Complexity Proofs for Protocols
- Information Security
- Information and Communications Security
Cited In (3)
Uses Software
This page was built for publication: Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2456502)