S Jiang, R Safavi-Naini - Financial Cryptography and Data Security: 12th …, 2008 - Springer
A deniable key exchange allows two parties to jointly share a secret key while neither of two nor an outsider can prove to a third party that the communication between the two …
J Kar - International Journal of Network Security, Taiwan, 2013 - kau.edu.sa
Deniable authentication protocol enables a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. This property is very …
MH Lim, S Lee, Y Park, H Lee - … Science and Its Applications–ICCSA 2007 …, 2007 - Springer
Deniability is defined as a privacy property which enables protocol principals to deny their involvement after they had taken part in a particular protocol run. Lately, Chou et al. had …
Modeling security for protocols running in the complex network environment of the Internet can be a daunting task. Ideally, a security model for the Internet should provide the following …
S Zeng, Y Chen - Wireless Communications and Mobile …, 2018 - Wiley Online Library
VANETs need secure communication. Authentication in VANETs resists the attack on the receipt of false information. Authenticated group key agreement (GKA) is used to establish a …
S Jiang - Theoretical Computer Science, 2014 - Elsevier
In this paper, we propose a new notion of timed encryption, in which the encryption is secure within time t while it is completely insecure after some time T> t. We consider the setting …
J Kar - Security and Privacy in Mobile Information and …, 2012 - Springer
This paper describes a secure identity based deniable authentication protocol whose security is based on difficulty of breaking Diffie-Hellman Problem on Elliptic Curve (ECDHP) …