Efficient User Authentication and Key Agreement in Ubiquitous Computing
From MaRDI portal
Publication:3601774
DOI10.1007/11751632_43zbMATH Open1209.68050OpenAlexW2166473856MaRDI QIDQ3601774FDOQ3601774
Authors: Wen-Shenq Juang
Publication date: 12 February 2009
Published in: Computational Science and Its Applications - ICCSA 2006 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11751632_43
Recommendations
- Computational Science and Its Applications – ICCSA 2004
- An efficient protocol for authenticated key agreement
- Information Security and Cryptology - ICISC 2005
- Efficient password-based authenticated key exchange protocol in the UC framework
- Efficient identity-based authenticated key agreement protocol from pairings
- An efficient nonce-based authentication scheme with key agreement
- Computational Science and Its Applications – ICCSA 2004
Cited In (10)
- Design and analysis of a security protocol for ubiquitous environments
- Title not available (Why is that?)
- A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment
- An inter-domain authentication scheme for pervasive computing environment
- Title not available (Why is that?)
- On the security of efficient user identification scheme
- Provably secure and efficient identification and key agreement protocol with user anonymity
- Authentication for Single/Multi Domain in Ubiquitous Computing Using Attribute Certification
- A new approach for UC security concurrent deniable authentication
- Ubi-RKE: a rhythm key based encryption scheme for ubiquitous devices
This page was built for publication: Efficient User Authentication and Key Agreement in Ubiquitous Computing
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3601774)