[图书][B] Protocols for authentication and key establishment

C Boyd, A Mathuria, D Stebila - 2003 - Springer
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …

Efficient UC-secure authenticated key-exchange for algebraic languages

F Ben Hamouda, O Blazy, C Chevalier… - … -Key Cryptography–PKC …, 2013 - Springer
Abstract Authenticated Key Exchange (AKE) protocols enable two parties to establish a
shared, cryptographically strong key over an insecure network using various authentication …

Password-based authenticated key exchange

D Pointcheval - International Workshop on Public Key Cryptography, 2012 - Springer
Abstract Authenticated Key Exchange protocols enable several parties to establish a shared
cryptographically strong key over an insecure network using various authentication means …

Sustainable and round-optimized group authenticated key exchange in vehicle communication

Z Li, M Wang, V Sharma, P Gope - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Vehicle authentication is an essential component validating the vehicle's identity and
ensuring the integrity of transformed data for intelligent transport vehicles (ITS) in the …

Password-authenticated group key exchange: A cross-layer design

Y Zhang, Y Xiang, X Huang - ACM Transactions on Internet Technology …, 2016 - dl.acm.org
Two-party password-authenticated key exchange (2PAKE) protocols provide a natural
mechanism for secret key establishment in distributed applications, and they have been …

Security and privacy techniques for the industrial Internet of Things

Y Zhang, X Huang - Security and Privacy Trends in the Industrial Internet of …, 2019 - Springer
The wide employment of Internet of Things (IoT) across industrial sectors creates the
Industrial Internet of Things (IIoT). In practical applications, however, the IIoT has many …

Data Security and Privacy in Industrial IoT

N Sharghivand, F Derakhshan - AI-Enabled Threat Detection and Security …, 2021 - Springer
Today, the integration of Industry 4.0 and IoT has opened up new opportunities for
generation, processing, and sharing vast amounts of data inside the industrial plants …

Tap-pair: Using spatial secrets for single-tap device pairing of augmented reality headsets

I Sluganovic, M Liskij, A Derek, I Martinovic - Proceedings of the Tenth …, 2020 - dl.acm.org
Augmented Reality (AR) headsets, which allow for a realistic integration between the
physical environment and virtual objects, are rapidly coming to customer and enterprise …

The fairy-ring dance: Password authenticated key exchange in a group

F Hao, X Yi, L Chen, SF Shahandashti - … of the 1st ACM Workshop on …, 2015 - dl.acm.org
In this paper, we study Password Authenticated Key Exchange (PAKE) in a group. First, we
present a generic" fairy-ring dance" construction that transforms any secure two-party PAKE …

Universally composable three‐party password‐authenticated key exchange with contributiveness

X Hu, Z Zhang, Q Zhang - International Journal of …, 2015 - Wiley Online Library
Three‐party password‐authenticated key exchange (3PAKE) allows two clients, each
sharing a password with a trusted server, to establish a session key with the help of the …