Today’s computer is often infected by malwares and conventional communication channels such as inter-process communication (IPC) are attractive attack surface for attackers because important information such as user’s personal data and passwords are transmitted between processes over IPC. In addition, there is no other protection other than the access control mechanism provided by the underlying OS, but it is not always sufficient. To improve the situation, this paper proposes a key agreement protocol between processes using a network socket, which is one of the IPC methods. Our protocol provides a means for legitimate processes to cryptographically communicate over the IPC. We use an uncertain channel for secure key agreement...
[[abstract]]Many authentication and key agreement protocols were proposed for protecting communicate...
Key agreement protocols are a fundamental building block for ensuring authenticated and private com...
Key exchange protocols allow two or more parties communicating over a public network to establish a ...
Operating systems provide various inter-process communication (IPC) mechanisms. Software application...
This paper proposes new protocols for two goals: authenticated key agreement and authenticated key a...
[[abstract]]By its very nature, a non-authenticated multi-party key agreement protocol cannot provid...
The original publication is available at: www.springerlink.com Copyright Springer VerlagWe present a...
The paper presents some simple techniques for key establishment over a radio link in pure peer-to-pe...
As electronic communication grows in popularity and re-places paper as an accepted official medium, ...
Session initiation protocol (SIP) is the most widely used application layer control protocol for cre...
In cryptography a critical type of attack known as Sampling Attack, where by an outsider Eve obtains...
[[abstract]]Key exchange protocol is important for sending secret messages using the session key bet...
[[abstract]]Malicious intruders may launch as many invalid requests as possible without establishing...
With the advancement in Internet-based technologies, network applications are no longer just limited...
Abstract — We present a set of simple techniques for key establishment over a radio link in peer-to-...
[[abstract]]Many authentication and key agreement protocols were proposed for protecting communicate...
Key agreement protocols are a fundamental building block for ensuring authenticated and private com...
Key exchange protocols allow two or more parties communicating over a public network to establish a ...
Operating systems provide various inter-process communication (IPC) mechanisms. Software application...
This paper proposes new protocols for two goals: authenticated key agreement and authenticated key a...
[[abstract]]By its very nature, a non-authenticated multi-party key agreement protocol cannot provid...
The original publication is available at: www.springerlink.com Copyright Springer VerlagWe present a...
The paper presents some simple techniques for key establishment over a radio link in pure peer-to-pe...
As electronic communication grows in popularity and re-places paper as an accepted official medium, ...
Session initiation protocol (SIP) is the most widely used application layer control protocol for cre...
In cryptography a critical type of attack known as Sampling Attack, where by an outsider Eve obtains...
[[abstract]]Key exchange protocol is important for sending secret messages using the session key bet...
[[abstract]]Malicious intruders may launch as many invalid requests as possible without establishing...
With the advancement in Internet-based technologies, network applications are no longer just limited...
Abstract — We present a set of simple techniques for key establishment over a radio link in peer-to-...
[[abstract]]Many authentication and key agreement protocols were proposed for protecting communicate...
Key agreement protocols are a fundamental building block for ensuring authenticated and private com...
Key exchange protocols allow two or more parties communicating over a public network to establish a ...