ACM Transactions on Computer Systems (TOCS)
Lower bounds on messages and rounds for network authentication protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Computer communications security: principles, standard protocols and techniques
Computer communications security: principles, standard protocols and techniques
Refinement and extension of encrypted key exchange
ACM SIGOPS Operating Systems Review
Provably secure session key distribution: the three party case
STOC '95 Proceedings of the twenty-seventh annual ACM symposium on Theory of computing
Using encryption for authentication in large networks of computers
Communications of the ACM
Three-party encrypted key exchange: attacks and a solution
ACM SIGOPS Operating Systems Review
Password-Authenticated Key Exchange between Clients with Different Passwords
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
KryptoKnight Authentication and Key Distribution System
ESORICS '92 Proceedings of the Second European Symposium on Research in Computer Security
Optimal authentication protocols resistant to password guessing attacks
CSFW '95 Proceedings of the 8th IEEE workshop on Computer Security Foundations
A Simple Logic for Authentication Protocol Design
CSFW '98 Proceedings of the 11th IEEE workshop on Computer Security Foundations
An Adaptable and Reliable Authentication Protocol for Communication Networks
INFOCOM '97 Proceedings of the INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution
Encrypted Key Exchange: Password-Based Protocols SecureAgainst Dictionary Attacks
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
Efficient network authentication protocols: lower bounds and optimal implementations
Distributed Computing
New directions in cryptography
IEEE Transactions on Information Theory
Kerberos: an authentication service for computer networks
IEEE Communications Magazine
Protecting poorly chosen secrets from guessing attacks
IEEE Journal on Selected Areas in Communications
Security enhancement of the communication-efficient AUTHMAC_DH protocols
Security and Communication Networks
A security enhanced authentication and key distribution protocol for wireless networks
Security and Communication Networks
Hi-index | 0.00 |
In 2004, Aslan presented a novel protocol for authentication and key distribution, named AUTHMAC_DH. The proposed AUTHMAC_DH protocol aims to achieve a comparable performance with the Kerberos protocol and to improve its weaknesses. Based on the AUTHMAC_DH protocol developed by Aslan, a communication-efficient AUTHMAC_DH protocol is proposed in this investigation. The computation cost of the proposed protocol is equal to that of the AUTHMAC_DH protocol of Aslan. The proposed communication-efficient AUTHMAC_DH protocol also achieves the goals of authentication and key distribution. However, the numbers of messages and rounds in communication are fewer than those of the protocol of Aslan.