[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Bresson et al., 2004 - Google Patents

Mutual authentication and group key agreement for low-power mobile devices

Bresson et al., 2004

View PDF
Document ID
6774564541903156634
Author
Bresson E
Chevassut O
Essiari A
Pointcheval D
Publication year
Publication venue
Computer Communications

External Links

Snippet

Wireless networking has the power to fit the Internet with wings, however, it will not take off until the security technological hurdles have been overcome. In this paper we propose a very efficient and provably secure group key agreement well suited for unbalanced networks …
Continue reading at www.di.ens.fr (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Bresson et al. Mutual authentication and group key agreement for low-power mobile devices
JP4527358B2 (en) An authenticated individual cryptographic system that does not use key escrow
Wu et al. An efficient user authentication and key exchange protocol for mobile client–server environment
Shim BASIS: A practical multi-user broadcast authentication scheme in wireless sensor networks
Sun et al. A provable authenticated group key agreement protocol for mobile environment
Saxena et al. Identity-based access control for ad hoc groups
Al-Riyami Cryptographic schemes based on elliptic curve pairings
Islam et al. Provably secure and pairing‐free identity‐based handover authentication protocol for wireless mobile networks
Ruan et al. After-the-fact leakage-resilient identity-based authenticated key exchange
Wu et al. An efficient and secure identity-based authentication and key agreement protocol with user anonymity for mobile devices
Li et al. CAKA: a novel certificateless-based cross-domain authenticated key agreement protocol for wireless mesh networks
Gebremichael et al. Lightweight iot group key establishment scheme using one-way accumulator
Zhu et al. An efficient chaotic maps-based deniable authentication group key agreement protocol
Kasyoka et al. Multi‐user broadcast authentication scheme for wireless sensor network based on elliptic curve cryptography
Yavuz et al. Self-sustaining, efficient and forward-secure cryptographic constructions for unattended wireless sensor networks
Nguyen et al. Authenticated key agreement mediated by a proxy re-encryptor for the internet of things
Zhang et al. Identity‐based construction for secure and efficient handoff authentication schemes in wireless networks
Zhu A provable one-way authentication key agreement scheme with user anonymity for multi-server environment
Naresh et al. Provably secure group key agreement protocol based on ECDH with integrated signature
Chien et al. Improved ID-based security framework for ad hoc network
Tseng et al. A robust user authentication scheme with self‐certificates for wireless sensor networks
Xia et al. Breaking and repairing the certificateless key agreement protocol from ASIAN 2006
Porambage et al. Public key based protocols–ec crypto
Yasmin et al. A pairing-free ID-based one-pass authenticated key establishment protocol for wireless sensor networks
Yang et al. Efficient anonymous roaming and its security analysis