ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Improvement on a batch authenticated key agreement scheme
Frontiers of Computer Science
◽
10.1007/s11704-020-0194-7
◽
2021
◽
Vol 16
(2)
◽
Author(s):
Qingfeng Cheng
◽
Ting Chen
◽
Siqi Ma
◽
Xinghua Li
Keyword(s):
Key Agreement
◽
Authenticated Key Agreement
Download Full-text
Related Documents
Cited By
References
Efficient Dynamic-Id Based Password Authenticated Key Agreement Using Smart Cards Without Time Concurrency
i-manager’s Journal on Software Engineering
◽
10.26634/jse.3.1.305
◽
2008
◽
Vol 3
(1)
◽
pp. 39-44
Author(s):
Shoba Bindu C
◽
Chandra Sekhar Reddy P
◽
Satya Narayana B
Keyword(s):
Key Agreement
◽
Smart Cards
◽
Authenticated Key Agreement
◽
Dynamic Id
Download Full-text
Enhanced Attribute-Based Authenticated Key Agreement Protocol in the Standard Model
Chinese Journal of Computers
◽
10.3724/sp.j.1016.2013.02156
◽
2014
◽
Vol 36
(10)
◽
pp. 2156-2167
Author(s):
Qiang LI
◽
Deng-Guo FENG
◽
Li-Wu ZHANG
◽
Zhi-Gang GAO
Keyword(s):
Standard Model
◽
Key Agreement
◽
Authenticated Key Agreement
◽
Key Agreement Protocol
◽
The Standard Model
Download Full-text
A Pairing Free Identity Based Two Party Authenticated Key Agreement Protocol Using Hexadecimal Extended ASCII Elliptic Curve Cryptography
Wireless Personal Communications
◽
10.1007/s11277-021-08168-x
◽
2021
◽
Author(s):
Vivek Kumar
◽
Sangram Ray
◽
Mou Dasgupta
◽
Muhammad Khurram Khan
Keyword(s):
Elliptic Curve
◽
Elliptic Curve Cryptography
◽
Key Agreement
◽
Authenticated Key Agreement
◽
Key Agreement Protocol
◽
Identity Based
Download Full-text
Cryptanalysis and enhancement of two-pass authenticated key agreement with key confirmation protocols
IETE Technical Review
◽
10.4103/0256-4602.62786
◽
2010
◽
Vol 27
(3)
◽
pp. 252
◽
Cited By ~ 5
Author(s):
Zeyad Mohammad
◽
Yaw-Chung Chen
◽
Chien-Lung Hsu
◽
Chi-Chun Lo
Keyword(s):
Key Agreement
◽
Authenticated Key Agreement
Download Full-text
Security Analysis on an Efficient and Provably Secure Authenticated Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks
2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS)
◽
10.1109/icais50930.2021.9395790
◽
2021
◽
Author(s):
Salman Shamshad
◽
Mohammad S. Obaidat
◽
Minahil
◽
Muhammad Asad Saleem
◽
Usman Shamshad
◽
...
Keyword(s):
Ad Hoc Networks
◽
Key Agreement
◽
Vehicular Ad Hoc Networks
◽
Ad Hoc
◽
Security Analysis
◽
Authenticated Key Agreement
◽
Key Agreement Protocol
◽
Hoc Networks
◽
Provably Secure
Download Full-text
Anonymous authenticated key agreement and group proof protocol for wearable computing
IEEE Transactions on Mobile Computing
◽
10.1109/tmc.2020.3048703
◽
2021
◽
pp. 1-1
Author(s):
Yimin Guo
◽
Zhenfeng Zhang
◽
Yajun Guo
Keyword(s):
Key Agreement
◽
Wearable Computing
◽
Authenticated Key Agreement
Download Full-text
A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System
Journal of Medical Systems
◽
10.1007/s10916-015-0322-3
◽
2015
◽
Vol 39
(11)
◽
Cited By ~ 16
Author(s):
Chun-Ta Li
◽
Chi-Yao Weng
◽
Cheng-Chi Lee
◽
Chun-Cheng Wang
Keyword(s):
Information System
◽
Key Agreement
◽
User Authentication
◽
Authenticated Key Agreement
◽
Remote User Authentication
◽
Integrated Epr Information System
◽
Remote User
Download Full-text
Cryptographically secure privacy-preserving authenticated key agreement protocol for an IoT network: A step towards critical infrastructure protection
Peer-to-Peer Networking and Applications
◽
10.1007/s12083-021-01236-w
◽
2021
◽
Author(s):
Vidyotma Thakur
◽
Gaurav Indra
◽
Nitin Gupta
◽
Pushpita Chatterjee
◽
Omar Said
◽
...
Keyword(s):
Key Agreement
◽
Critical Infrastructure
◽
Privacy Preserving
◽
Critical Infrastructure Protection
◽
Authenticated Key Agreement
◽
Infrastructure Protection
◽
Key Agreement Protocol
Download Full-text
Privacy Preserving Authenticated Key Agreement based on Bilinear Pairing for uHealthcare
The International Arab Journal of Information Technology
◽
10.34028/18/4/4
◽
2021
◽
Vol 18
(4)
◽
Author(s):
Sunghyun Cho
◽
Hyunsung Kim
Keyword(s):
Key Agreement
◽
Privacy Preserving
◽
Bilinear Pairing
◽
Authenticated Key Agreement
Download Full-text
Security and efficiency enhancement of an anonymous three-party password-authenticated key agreement using extended chaotic maps
PLoS ONE
◽
10.1371/journal.pone.0203984
◽
2018
◽
Vol 13
(10)
◽
pp. e0203984
◽
Cited By ~ 1
Author(s):
Qi Xie
◽
Yanrong Lu
◽
Xiao Tan
◽
Zhixiong Tang
◽
Bin Hu
Keyword(s):
Key Agreement
◽
Chaotic Maps
◽
Efficiency Enhancement
◽
Authenticated Key Agreement
◽
Extended Chaotic Maps
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close