Diffie-Hellman key distribution extended to group communication
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Encrypted Key Exchange: Password-Based Protocols SecureAgainst Dictionary Attacks
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
Network-in-a-box: how to set up a secure wireless network in under a minute
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Secure communications over insecure channels based on short authenticated strings
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
SAS-Based authenticated key agreement
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Password-Based group key exchange in a constant number of rounds
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Efficient mutual data authentication using manually authenticated strings
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Key agreement in ad hoc networks
Computer Communications
Multichannel Security Protocols
IEEE Pervasive Computing
Mind your manners: socially appropriate wireless key establishment for groups
WiSec '08 Proceedings of the first ACM conference on Wireless network security
GAnGS: gather, authenticate 'n group securely
Proceedings of the 14th ACM international conference on Mobile computing and networking
User-aided data authentication
International Journal of Security and Networks
SPATE: small-group PKI-less authenticated trust establishment
Proceedings of the 7th international conference on Mobile systems, applications, and services
SAS-based group authentication and key agreement protocols
PKC'08 Proceedings of the Practice and theory in public key cryptography, 11th international conference on Public key cryptography
GesturePIN: using discrete gestures for associating mobile devices
Proceedings of the 12th international conference on Human computer interaction with mobile devices and services
Groupthink: usability of secure group association for wireless devices
Proceedings of the 12th ACM international conference on Ubiquitous computing
Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey
Journal of Computer Security
Spatial co-location for device association: the connected object way
Proceedings of the 2011 international workshop on Networking and object memories for the internet of things
Short-Output universal hash functions and their use in fast and secure data authentication
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
How groups of users associate wireless devices
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
SafeSlinger: easy-to-use and secure public-key exchange
Proceedings of the 19th annual international conference on Mobile computing & networking
Hi-index | 0.00 |
A security association specifies the cryptographic keys and algorithms to be used for secure communication among the participants in the association. Key agreement in ad hoc scenarios, that is, without key management infrastructure is a challenging task, in particular, if the security association should involve a group of entities. In this paper, existing pairwise ad hoc key agreement protocols are extended for groups of arbitrary number of entities. New protocols based on both passkeys and numeric comparison (short authenticated strings) are presented. Also security properties and group management for these protocols are discussed.