The role of the adversary model in applied security research

Q Do, B Martini, KKR Choo - Computers & Security, 2019 - Elsevier
Adversary models have been integral to the design of provably-secure cryptographic
schemes or protocols. However, their use in other computer science research disciplines is …

Lightweight authentication protocol for M2M communications of resource-constrained devices in industrial Internet of Things

E Lara, L Aguilar, MA Sanchez, JA García - Sensors, 2020 - mdpi.com
The Industrial Internet of Things (IIoT) consists of sensors, networks, and services to connect
and control production systems. Its benefits include supply chain monitoring and machine …

Strongly secure certificateless key agreement

G Lippold, C Boyd, J Gonzalez Nieto - International conference on pairing …, 2009 - Springer
We introduce a formal model for certificateless authenticated key exchange (CL-AKE)
protocols. Contrary to what might be expected, we show that the natural combination of an …

[HTML][HTML] Design of improved password authentication and update scheme based on elliptic curve cryptography

SKH Islam, GP Biswas - Mathematical and Computer Modelling, 2013 - Elsevier
Secured password authentication and update of passwords are two essential requirements
for remote login over unreliable networks. In this paper, an elliptic curve cryptography (ECC) …

Design and analysis of an improved smartcard‐based remote user password authentication scheme

SKH Islam - International Journal of Communication Systems, 2016 - Wiley Online Library
With the fast development of the Internet and the telecommunication technologies, internet
users are carrying out various electronic transactions over internet by means of the …

Lightweight authentication protocol using self-certified public keys for wireless body area networks in health-care applications

E Lara, L Aguilar, JA Garcia - IEEE Access, 2021 - ieeexplore.ieee.org
Health-care centers have been meeting challenges due to the increase in the aging
population and chronic diseases that need continuous medical monitoring. Wireless body …

Strongly secure certificateless key exchange without pairing

G Yang, CH Tan - Proceedings of the 6th ACM Symposium on …, 2011 - dl.acm.org
In certificateless cryptography, a user secret key is derived from two partial secrets: one is
the identity-based secret key (corresponding to the user identity) generated by a Key …

A provably secure ID-based mutual authentication and key agreement scheme for mobile multi-server environment without ESL attack

SKH Islam - Wireless Personal Communications, 2014 - Springer
In mobile multi-server authentication, a client can access different servers over an insecure
channel like Internet and wireless networks for numerous online applications. In the …

[HTML][HTML] A new two-round certificateless authenticated key agreement protocol without bilinear pairings

D He, Y Chen, J Chen, R Zhang, W Han - Mathematical and Computer …, 2011 - Elsevier
Certificateless public key cryptography (CLPKC), which can simplify the complex certificate
management in the traditional public key cryptography and resolve the key escrow problem …

A study of two-party certificateless authenticated key-agreement protocols

C Swanson, D Jao - Progress in Cryptology-INDOCRYPT 2009: 10th …, 2009 - Springer
We survey the set of all prior two-party certificateless key agreement protocols available in
the literature at the time of this work. We find that all of the protocols exhibit vulnerabilities of …