[图书][B] Protocols for authentication and key establishment

C Boyd, A Mathuria, D Stebila - 2003 - Springer
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …

Full session key agreement scheme based on chaotic map in vehicular ad hoc networks

J Cui, Y Wang, J Zhang, Y Xu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Vehicular ad hoc networks (VANETs) are wireless self-organizing networks, whose
communication is conducted through open wireless channels, thus making it vulnerable to …

A survey of group key agreement protocols with constant rounds

H Xiong, Y Wu, Z Lu - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Group key agreement (shorten as GKA) protocol enables a group of users to negotiate a one-
time session key and protect the thereafter group-oriented communication with this session …

Anonymous dynamic group authenticated key agreements using physical unclonable functions for internet of medical things

TF Lee, X Ye, SH Lin - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Group authenticated key agreements (GAKAs) for an Internet of Medical Things (IoMT)
enable medical sensor devices to authenticate each other and agree upon a common …

An Anonymous Signature-Based Authentication and Key Agreement Scheme for Vehicular Ad Hoc Networks.

AS Rajasekaran, M Islam Satti - Security & Communication …, 2022 - search.ebscohost.com
Anonymous authentication is a critical step in safeguarding vehicle privacy and security in
VANETs. VANETs connected with blockchain are gaining popularity as a means to increase …

Provably secure constant round contributory group key agreement in dynamic setting

R Dutta, R Barua - IEEE Transactions on Information Theory, 2008 - ieeexplore.ieee.org
In this paper, we present and analyze a variant of Burmester-Desmedt group key agreement
protocol (BD) and enhance it to dynamic setting where a set of users can leave or join the …

Round-efficient and sender-unrestricted dynamic group key agreement protocol for secure group communications

L Zhang, Q Wu, J Domingo-Ferrer… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Modern collaborative and group-oriented applications typically involve communications over
open networks. Given the openness of today's networks, communications among group …

[图书][B] Security in RFID and sensor networks

P Kitsos - 2016 - taylorfrancis.com
In the past several years, there has been an increasing trend in the use of Radio Frequency
Identification (RFID) and Wireless Sensor Networks (WSNs) as well as in the integration of …

Efficient searchable ID-based encryption with a designated server

TY Wu, TT Tsai, YM Tseng - annals of telecommunications-annales des …, 2014 - Springer
Public key encryption with keyword search (PEKS) is a mechanism that allows one to extract
e-mails containing a particular keyword by providing a trapdoor corresponding to the …

A group key agreement protocol based on ecdh and short signature

Z Yang, Z Wang, F Qiu, F Li - Journal of Information Security and …, 2023 - Elsevier
A group key agreement protocol allows a set of users to establish a common session key
over an open network. A dynamic contributory group key agreement (DCGKA) protocol …