Abstract. Recently, Park and Lim (1998) proposed two key distribution systems for secure VSAT satellite communications. One provides indirect authentication, and another scheme enables that two parties can directly authenticate each other. However, this article will show that the proposed schemes are insecure enough by presenting two impersonation attacks on them. Besides, an im-proved scheme will be proposed, which is secure against the impersonation attack and provides direct mutual authentication between two parties. Key words: satellite communication, key distribution, cryptanalysis. 1
In satellite communication systems, satellite power and processing capacities are limited, which mea...
In symmetric encryption systems, secure messages are exchanged with the encrypted message sent over ...
This paper explores effective algorithms for managing the distributed processing and secure data tra...
[[abstract]]Recently, Park and Lim (1998) proposed two key distribution systems for secure VSAT sate...
[[abstract]]Satellite communication technology was mainly used for broadcasting service and long-hua...
[[abstract]]The issue of key agreement in securing very small aperture terminal (VSAT) satellite com...
Satellite communication technology was mainly used for broadcasting set-vice and long-hual transmiss...
This paper addresses issues relating to the generation of secure encryption keys for use in inter-sa...
Satellite communication has played an important part in many different industries because of its adv...
[[abstract]]In this article, the authors shall propose a simple and efficient authentication scheme ...
Abstract The authentication protocols existing in the realm of mobile satellite communication netwo...
Satellite communication networks have been widely used to provide essential communication services, ...
[[abstract]]Nowadays, wireless communication becomes more and more popular. In 2003, Hwang et al. pr...
Abstract: In symmetric encryption systems, secure messages are exchanged with the encrypted message ...
Abstract This paper discusses the security aspects of a registration protocol in a mobile satellite ...
In satellite communication systems, satellite power and processing capacities are limited, which mea...
In symmetric encryption systems, secure messages are exchanged with the encrypted message sent over ...
This paper explores effective algorithms for managing the distributed processing and secure data tra...
[[abstract]]Recently, Park and Lim (1998) proposed two key distribution systems for secure VSAT sate...
[[abstract]]Satellite communication technology was mainly used for broadcasting service and long-hua...
[[abstract]]The issue of key agreement in securing very small aperture terminal (VSAT) satellite com...
Satellite communication technology was mainly used for broadcasting set-vice and long-hual transmiss...
This paper addresses issues relating to the generation of secure encryption keys for use in inter-sa...
Satellite communication has played an important part in many different industries because of its adv...
[[abstract]]In this article, the authors shall propose a simple and efficient authentication scheme ...
Abstract The authentication protocols existing in the realm of mobile satellite communication netwo...
Satellite communication networks have been widely used to provide essential communication services, ...
[[abstract]]Nowadays, wireless communication becomes more and more popular. In 2003, Hwang et al. pr...
Abstract: In symmetric encryption systems, secure messages are exchanged with the encrypted message ...
Abstract This paper discusses the security aspects of a registration protocol in a mobile satellite ...
In satellite communication systems, satellite power and processing capacities are limited, which mea...
In symmetric encryption systems, secure messages are exchanged with the encrypted message sent over ...
This paper explores effective algorithms for managing the distributed processing and secure data tra...