The trusted server based key establishment protocols are well received by the research community. In this thesis we have discussed the benefits of asymmetric key based authentication scheme mediated by a trusted server which is known to all the users in a system. We have proposed a new trusted server based key establishment protocol (and named it AK-protocol) that makes use of well known certificate based authentication scheme (or ID based scheme when medium level of security is required), and the session key generation requires equal contribution of the trusted server and the participating clients. That is, the generation of ephemeral keys exclusively lies with the trusted server and the generation of a session key is completed only after ...
We discuss two-party mutual authentication protocols providing authenticated key exchange, focusing ...
In this paper we study security definitions for authenticated key exchange (AKE) protocols. We obse...
The vulnerable part of communications between user and server is the poor authentication level at th...
Informal analysis of authenticated key establishment (ake) protocols was commonly accepted as the v...
[[abstract]]A three-party Authenticated Key Agreement (AKA) protocol in the distributed computing en...
A three-party Authenticated Key Agreement (AKA) protocol in the distributed computing environment is...
A three-party Authenticated Key Agreement (AKA) protocol in the distributed computing environment is...
With the advancement in Internet-based technologies, network applications are no longer just limited...
Abstract. We investigate a number of issues related to identity based authenticated key agreement pr...
Abstract. We investigate a number of issues related to identity based authenticated key agreement pr...
One-pass authenticated key establishment (AKE) protocols are arguably better suited to the ID-based ...
One-pass authenticated key establishment (AKE) protocols are arguably better suited to the ID-based ...
Abstract. In this work, we consider Authentication and Key Agreement (AKA), a popular client-server ...
Establishing a session key (SSK) is very important for real-world deployment in open networks, which...
[[abstract]]An efficient and practical authenticated key agreement protocol based on the line of geo...
We discuss two-party mutual authentication protocols providing authenticated key exchange, focusing ...
In this paper we study security definitions for authenticated key exchange (AKE) protocols. We obse...
The vulnerable part of communications between user and server is the poor authentication level at th...
Informal analysis of authenticated key establishment (ake) protocols was commonly accepted as the v...
[[abstract]]A three-party Authenticated Key Agreement (AKA) protocol in the distributed computing en...
A three-party Authenticated Key Agreement (AKA) protocol in the distributed computing environment is...
A three-party Authenticated Key Agreement (AKA) protocol in the distributed computing environment is...
With the advancement in Internet-based technologies, network applications are no longer just limited...
Abstract. We investigate a number of issues related to identity based authenticated key agreement pr...
Abstract. We investigate a number of issues related to identity based authenticated key agreement pr...
One-pass authenticated key establishment (AKE) protocols are arguably better suited to the ID-based ...
One-pass authenticated key establishment (AKE) protocols are arguably better suited to the ID-based ...
Abstract. In this work, we consider Authentication and Key Agreement (AKA), a popular client-server ...
Establishing a session key (SSK) is very important for real-world deployment in open networks, which...
[[abstract]]An efficient and practical authenticated key agreement protocol based on the line of geo...
We discuss two-party mutual authentication protocols providing authenticated key exchange, focusing ...
In this paper we study security definitions for authenticated key exchange (AKE) protocols. We obse...
The vulnerable part of communications between user and server is the poor authentication level at th...