A three round authenticated group key agreement protocol for ad hoc networks
Pervasive and Mobile Computing
Security weakness in a three-party pairing-based protocol for password authenticated key exchange
Information Sciences: an International Journal
Protocol Composition Logic (PCL)
Electronic Notes in Theoretical Computer Science (ENTCS)
Comparing the Pre- and Post-specified Peer Models for Key Agreement
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
Analysis of Handover Key Management schemes under IETF perspective
Computer Standards & Interfaces
An efficient mobile PACE implementation
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Extended KCI attack against two-party key establishment protocols
Information Processing Letters
Enhancing the security and efficiency of 3-d secure
ISC'06 Proceedings of the 9th international conference on Information Security
Towards provably secure group key agreement building on group theory
VIETCRYPT'06 Proceedings of the First international conference on Cryptology in Vietnam
Secure rejoining scheme for dynamic sensor networks
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Authenticated key agreement without subgroup element verification
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I
Errors in computational complexity proofs for protocols
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
On session key construction in provably-secure key establishment protocols
Mycrypt'05 Proceedings of the 1st international conference on Progress in Cryptology in Malaysia
Deposit-case attack against secure roaming
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Improving IP address autoconfiguration security in MANETs using trust modelling
MSN'05 Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks
Secure communications over insecure channels based on short authenticated strings
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
An open approach for designing secure electronic immobilizers
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Hybrid signcryption schemes with outsider security
ISC'05 Proceedings of the 8th international conference on Information Security
Tripartite key exchange in the canetti-krawczyk proof model
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Proof-Based design of security protocols
CSR'10 Proceedings of the 5th international conference on Computer Science: theory and Applications
A formal approach for reasoning about a class of diffie-hellman protocols
FAST'05 Proceedings of the Third international conference on Formal Aspects in Security and Trust
On the security of an novel protocol for downloadable CAS
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication
Robust smart-cards-based user authentication scheme with user anonymity
Security and Communication Networks
Analysis of a secure cooperative channel sensing protocol for cognitive radio networks
Proceedings of the Fifth International Conference on Security of Information and Networks
On the analysis and design of a family tree of smart card based user authentication schemes
UIC'07 Proceedings of the 4th international conference on Ubiquitous Intelligence and Computing
OAKE: a new family of implicitly authenticated diffie-hellman protocols
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
A system architecture, processor, and communication protocol for secure implants
ACM Transactions on Architecture and Code Optimization (TACO)
Hi-index | 0.01 |
Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties and vulnerabilities of different protocols can vary greatly.This is the first comprehensive and integrated treatment of these protocols. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols which have been broken in the literature.As well as a clear and uniform presentation of the protocols this book includes a description of all the main attack types and classifies most protocols in terms of their properties and resource requirements. It also includes tutorial material suitable for graduate students.