메뉴 건너뛰기




Volumn 66, Issue 5-6, 2011, Pages 331-337

Analysis and improvement of a new authenticated group key agreement in a mobile environment

Author keywords

Bilinear pairings; Computational Diffie Hellman problem; Group key agreement; Impersonation attack

Indexed keywords

AUTHENTICATED GROUP KEY AGREEMENT; AUTHENTICATED GROUP KEY AGREEMENT PROTOCOL; BILINEAR PAIRING; COMPUTATIONAL DIFFIE-HELLMAN PROBLEM; DIFFIE-HELLMAN ASSUMPTION; GROUP KEY AGREEMENT; IMPERSONATION ATTACK; KEY COMPROMISE; MOBILE ENVIRONMENTS; MOBILE USERS; MUTUAL AUTHENTICATION; NEW PROTOCOL; PRIVATE KEY; SECURITY WEAKNESS;

EID: 79958802104     PISSN: 00034347     EISSN: 19589395     Source Type: Journal    
DOI: 10.1007/s12243-010-0213-z     Document Type: Article
Times cited : (18)

References (16)
  • 9
    • 33745766832 scopus 로고    scopus 로고
    • Modeling insider attacks on group key-exchange protocols
    • DOI 10.1145/1102120.1102146, CCS 2005 - Proceedings of the 12th ACM Conference on Computer and Communications Security
    • Katz J, Shin JS (2005) Modeling insider attacks on group key-exchange protocols. In: Proceedings of the 12th ACM conference on computer and communications security (CCS'05), pp 180-189 (Pubitemid 44022002)
    • (2005) Proceedings of the ACM Conference on Computer and Communications Security , pp. 180-189
    • Katz, J.1    Shin, J.S.2
  • 11
    • 72849129806 scopus 로고    scopus 로고
    • A new authenticated group key agreement in a mobile environment
    • 10.1007/s12243-009-0096-z
    • C-C Lee T-H Lin C-S Tsai 2009 A new authenticated group key agreement in a mobile environment Ann Telecommun 64 735 744 10.1007/s12243-009-0096-z
    • (2009) Ann Telecommun , vol.64 , pp. 735-744
    • Lee, C.-C.1    Lin, T.-H.2    Tsai, C.-S.3
  • 12
    • 67649701446 scopus 로고    scopus 로고
    • Pairing-based two-party authenticated key agreement protocol
    • report 354
    • Lu R, Cao Z, Su R, Shao J (2005) Pairing-based two-party authenticated key agreement protocol. In: Cryptology ePrint archive, report 354
    • (2005) Cryptology EPrint Archive
    • Lu, R.1    Cao, Z.2    Su, R.3    Shao, J.4
  • 13
    • 77954580101 scopus 로고    scopus 로고
    • Modeling leakage of ephemeral secrets in tripartite/group key exchange
    • Manulis M, Suzuki K, Ustaoglu B (2009) Modeling leakage of ephemeral secrets in tripartite/group key exchange. In: Proceedings of ICISC 2009, pp 16-33
    • (2009) Proceedings of ICISC 2009 , pp. 16-33
    • Manulis, M.1    Suzuki, K.2    Ustaoglu, B.3
  • 15
    • 19744369256 scopus 로고    scopus 로고
    • DDH-based group key agreement in a mobile environment
    • DOI 10.1016/j.jss.2004.10.024, PII S0164121204002262
    • J Nam J Lee S Kim D Won 2005 DDH-based group key agreement in a mobile environment J Syst Softw 78 1 73 83 10.1016/j.jss.2004.10.024 (Pubitemid 40743528)
    • (2005) Journal of Systems and Software , vol.78 , Issue.1 , pp. 73-83
    • Nam, J.1    Lee, J.2    Kim, S.3    Won, D.4
  • 16
    • 34249876364 scopus 로고    scopus 로고
    • A resource-constrained group key agreement protocol for imbalanced wireless networks
    • DOI 10.1016/j.cose.2006.12.001, PII S0167404806002082
    • Y-M Tseng 2007 A resource-constrained group key agreement protocol for imbalanced wireless networks Comput Secur 26 4 331 337 10.1016/j.cose.2006.12. 001 (Pubitemid 46873758)
    • (2007) Computers and Security , vol.26 , Issue.4 , pp. 331-337
    • Tseng, Y.-M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.