The role of the adversary model in applied security research
Q Do, B Martini, KKR Choo - Computers & Security, 2019 - Elsevier
Adversary models have been integral to the design of provably-secure cryptographic
schemes or protocols. However, their use in other computer science research disciplines is …
schemes or protocols. However, their use in other computer science research disciplines is …
A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks
In 2014, Turkanovic et al. proposed a smart card-based authentication scheme for
heterogeneous ad hoc wireless sensor network. This scheme is very efficient since it …
heterogeneous ad hoc wireless sensor network. This scheme is very efficient since it …
[書籍][B] Protocols for authentication and key establishment
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …
became outdated quickly. At the same time new developments have continued apace …
A survey on cluster-based group key agreement protocols for WSNs
E Klaoudatou, E Konstantinou… - … surveys & tutorials, 2010 - ieeexplore.ieee.org
The scope of this survey is to examine and thoroughly evaluate the cluster-based Group Key
Agreement (GKA) protocols for Wireless Sensor Networks (WSNs). Towards this goal, we …
Agreement (GKA) protocols for Wireless Sensor Networks (WSNs). Towards this goal, we …
Provably secure authenticated group Diffie-Hellman key exchange
E Bresson, O Chevassut, D Pointcheval - ACM Transactions on …, 2007 - dl.acm.org
Authenticated key-exchange protocols allow two participants A and B, communicating over a
public network and each holding an authentication means to exchange a shared secret …
public network and each holding an authentication means to exchange a shared secret …
Scyther: Semantics and verification of security protocols
CJF Cremers - 2006 - research.tue.nl
Recent technologies have cleared the way for large scale application of electronic
communication. The open and distributed nature of these communications implies that the …
communication. The open and distributed nature of these communications implies that the …
[書籍][B] Security properties
Security Properties | SpringerLink Skip to main content Advertisement SpringerLink Account
Menu Find a journal Publish with us Track your research Search Cart Book cover …
Menu Find a journal Publish with us Track your research Search Cart Book cover …
LMAAS-IoT: Lightweight multi-factor authentication and authorization scheme for real-time data access in IoT cloud-based environment
AYF Alsahlani, A Popa - Journal of Network and Computer Applications, 2021 - Elsevier
Abstract Internet of Things (IoT) is a network of interconnected smart devices which provides
tremendous benefits and can be applied in various fields including, but not limited to …
tremendous benefits and can be applied in various fields including, but not limited to …
Asymmetric group key agreement
A group key agreement (GKA) protocol allows a set of users to establish a common secret
via open networks. Observing that a major goal of GKAs for most applications is to establish …
via open networks. Observing that a major goal of GKAs for most applications is to establish …
On the performance of group key agreement protocols
Group key agreement is a fundamental building block for secure peer group communication
systems. Several group key management techniques were proposed in the last decade, all …
systems. Several group key management techniques were proposed in the last decade, all …