Efficient User Authentication and Key Agreement in Ubiquitous Computing
From MaRDI portal
Publication:3601774
Recommendations
- Computational Science and Its Applications – ICCSA 2004
- An efficient protocol for authenticated key agreement
- Information Security and Cryptology - ICISC 2005
- Efficient password-based authenticated key exchange protocol in the UC framework
- Efficient identity-based authenticated key agreement protocol from pairings
- An efficient nonce-based authentication scheme with key agreement
- Computational Science and Its Applications – ICCSA 2004
Cited in
(10)- scientific article; zbMATH DE number 6016674 (Why is no real title available?)
- A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment
- Design and analysis of a security protocol for ubiquitous environments
- Authentication for Single/Multi Domain in Ubiquitous Computing Using Attribute Certification
- An inter-domain authentication scheme for pervasive computing environment
- Ubi-RKE: a rhythm key based encryption scheme for ubiquitous devices
- Provably secure and efficient identification and key agreement protocol with user anonymity
- scientific article; zbMATH DE number 1962738 (Why is no real title available?)
- A new approach for UC security concurrent deniable authentication
- On the security of efficient user identification scheme
This page was built for publication: Efficient User Authentication and Key Agreement in Ubiquitous Computing
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3601774)