… privacy and security challenges effectively. In this paper, a sessionkeyagreementprotocol is … Simulation results showed that the proposed protocol exhibits the lowest communication …
… On the other hand, the authenticationscheme in Reference 23 … Keyagreement and authenticationprotocols have been presented in References 3, 24, while a key distribution protocol …
J Zhang, H Zhong, J Cui, Y Xu… - … Forensics and Security, 2020 - ieeexplore.ieee.org
… Sessionkeysecurity (SK-security) is supported even if temporary information is leaked. 2) … -to-many authentication and keyagreementscheme with an effectiveauthentication function …
S Shunmuganathan - Wireless Personal Communications, 2021 - Springer
… two factor secured multi-server sessionkeyagreementscheme based on two-way authentication. … It contains the global constant and the different sessioninitiation. Here the intruder ‘i’ is …
… We propose a novel secureauthentication and keyagreementprotocol based on ECC that … security flaws of Qui et al's scheme12 and is able to provide mutual authentication and user …
… authenticationprotocol for two interacting members in the following way: Definition 2: We can formally define a two-party authenticated keyagreement P by an efficient … in the scheme. X: …
… , secure access control and a keyagreement mechanism are required. The mechanism must utilize the two phases, ie, node authentication and keyagreement, … keyagreementscheme, …
J Cui, Y Wang, J Zhang, Y Xu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
… security and privacy preservation in VANETs, this paper proposes a full sessionkey agreementscheme … In this paper, the first phase describes the keyagreement between the fog …
ZU Rehman, S Altaf, S Iqbal - IEEE Access, 2020 - ieeexplore.ieee.org
… security features provided by the proposed scheme against other cyber-attacks. Secondly, we provide securityverification of the proposed scheme … cover informal verification using the …