key negotiation
Recently Published Documents


TOTAL DOCUMENTS

28
(FIVE YEARS 1)

H-INDEX

6
(FIVE YEARS 0)



2020 ◽  
Vol 23 (3) ◽  
pp. 1-28
Author(s):  
Daniele Antonioli ◽  
Nils Ole Tippenhauer ◽  
Kasper Rasmussen


Author(s):  
Jiang Guo ◽  
Miao Wang ◽  
Hanwen Zhang ◽  
Yujun Zhang
Keyword(s):  


With the large spread of wrist worn smart devices in day-to-day lives, an extensive series of applications are enabled. Securing message conversation between these devices has become a challenging issue, considering the high security necessities and low computation abilities of these wrist worn devices. In this paper, we propose a secure wrist worn smart device coupling arrangement by manipulating the wave indication of the strategies generated by the handshake to barter a trustworthy key between users. To guarantee the safety of key negotiation, a hybrid secured algorithm is further developed. On Comparing with existing algorithms, the planned algorithm evades complicated fault alteration algorithms. In existing work the key generation is small in size so it is easy to detect by the intruder, in order to overcome this issue the RSA algorithm is combined with the AES algorithm, So that the size of the key is increased due to the combined algorithm and therefore robustness of the key is increased compared to the existing method. Investigational results are provided, which prove that the proposed handshake acceleration-based coupling arrangement is strong, safe, and effectual.



2020 ◽  
Vol 16 (6) ◽  
pp. 875
Author(s):  
Cai Zengyu ◽  
Wu Zuodong ◽  
Zhang Jianwei ◽  
Wang Wenqian


2019 ◽  
Vol 2019 ◽  
pp. 1-10
Author(s):  
Yuling Chen ◽  
Xiaohan Hao ◽  
Wei Ren ◽  
Yi Ren

While key negotiation schemes, such as those based on Diffie–Hellman, have been the subject of ongoing research, designing an efficient and security scheme remains challenging. In this paper, we propose a novel key negotiation scheme based on blockchain, which can be deployed in blockchain-enabled contexts such as data sharing or facilitating electric transactions between vehicles (e.g., unmanned vehicles). We propose three candidates for flexible selection, namely, key exchanges via transaction currency values through value channels (such as the amount in transactions), automated key exchanges through static scripts,and dynamic scripts, which can not only guarantee key availability with timeliness but also defend against MITM (man-in-the-middle) attacks, packet-dropping attacks, and decryption failure attacks.



2019 ◽  
Vol 18 (5) ◽  
pp. 199-203
Author(s):  
Jean-Claude Usunier

Purpose For managers and senior executives who find themselves negotiating with international partners who differ in terms of culture, communication style, time orientation, as well as personal and professional backgrounds, understanding the complex range of factors that impact intercultural business negotiations (ICBN) for short – is a fundamentally important skill. Design/methodology/approach This paper is based on an organised review of literature on culture and business negotiations in Usunier (2019), systematically examining the interface of culture with dispositional (e.g. negotiator’s gender) and situational variable (e.g. type of contract, one-shot versus repeated deals). Findings Empathy is not all, culture overlaps and interacts with other key negotiation variables. The paper derives a set of guidelines for effective ICBN. Originality/value Many approaches to ICBN emphasise culture as a stand-alone variable. The approach helps to avoid naïve behaviour and proposes a framework for linking cultural aspects to other major situational and dispositional variables in the ICBN process.





2018 ◽  
Vol 5 (17) ◽  
pp. 154445
Author(s):  
Mohammad Tehseen ◽  
Huma Javed ◽  
Ishtiaq Hussain Shah ◽  
Sheeraz Ahmed
Keyword(s):  




Sign in / Sign up

Export Citation Format

Share Document