Computer Standards & Interfaces
An authentication scheme for mobile satellite communication systems
ACM SIGOPS Operating Systems Review
Anonymous Wireless Authentication on a Portable Cellular Mobile System
IEEE Transactions on Computers
Authenticated key agreement in dynamic peer groups
Theoretical Computer Science
A communication-efficient and fault-tolerant conference-key agreement protocol with forward secrecy
Journal of Systems and Software
A DoS and fault-tolerant authentication protocol for group communications in ad hoc networks
Computer Communications
A self-encryption authentication protocol for teleconference services
International Journal of Security and Networks
A novel efficient conference scheme for mobile communications
International Journal of Mobile Communications
Security weakness of Tseng's fault-tolerant conference-key agreement protocol
Journal of Systems and Software
A DDH-based group key agreement protocol for mobile environment
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
A novel conference key distribution system with re-keying protocol
HSI'05 Proceedings of the 3rd international conference on Human Society@Internet: web and Communication Technologies and Internet-Related Social Issues
A simple and efficient conference scheme for mobile communications
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Conference key distribution schemes for portable communication systems
Computer Communications
Hi-index | 0.08 |
We propose a new service for digital mobile communication systems. The service enables two or more users to hold a secure conference. Two requirements must be considered: privacy and authentication. Privacy involves ensuring that an eavesdropper cannot intercept the conversations of the parties holding the conference. Authentication involves ensuring that service is not obtained fraudulently in order to avoid usage charges. We present two new conference key distribution schemes for digital mobile communication systems. In these schemes, a group of users can generate a common secret keg over a public channel so that they may hold a secure conference