The role of the adversary model in applied security research

Q Do, B Martini, KKR Choo - Computers & Security, 2019 - Elsevier
Adversary models have been integral to the design of provably-secure cryptographic
schemes or protocols. However, their use in other computer science research disciplines is …

A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks

CC Chang, HD Le - IEEE Transactions on wireless …, 2015 - ieeexplore.ieee.org
In 2014, Turkanovic et al. proposed a smart card-based authentication scheme for
heterogeneous ad hoc wireless sensor network. This scheme is very efficient since it …

[图书][B] Protocols for authentication and key establishment

C Boyd, A Mathuria, D Stebila - 2003 - Springer
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …

A survey on cluster-based group key agreement protocols for WSNs

E Klaoudatou, E Konstantinou… - … surveys & tutorials, 2010 - ieeexplore.ieee.org
The scope of this survey is to examine and thoroughly evaluate the cluster-based Group Key
Agreement (GKA) protocols for Wireless Sensor Networks (WSNs). Towards this goal, we …

Provably secure authenticated group Diffie-Hellman key exchange

E Bresson, O Chevassut, D Pointcheval - ACM Transactions on …, 2007 - dl.acm.org
Authenticated key-exchange protocols allow two participants A and B, communicating over a
public network and each holding an authentication means to exchange a shared secret …

Scyther: Semantics and verification of security protocols

CJF Cremers - 2006 - research.tue.nl
Recent technologies have cleared the way for large scale application of electronic
communication. The open and distributed nature of these communications implies that the …

[图书][B] Security properties

C Cremers, S Mauw, C Cremers, S Mauw - 2012 - Springer
Security Properties | SpringerLink Skip to main content Advertisement SpringerLink Account
Menu Find a journal Publish with us Track your research Search Cart Book cover …

LMAAS-IoT: Lightweight multi-factor authentication and authorization scheme for real-time data access in IoT cloud-based environment

AYF Alsahlani, A Popa - Journal of Network and Computer Applications, 2021 - Elsevier
Abstract Internet of Things (IoT) is a network of interconnected smart devices which provides
tremendous benefits and can be applied in various fields including, but not limited to …

Asymmetric group key agreement

Q Wu, Y Mu, W Susilo, B Qin… - Advances in Cryptology …, 2009 - Springer
A group key agreement (GKA) protocol allows a set of users to establish a common secret
via open networks. Observing that a major goal of GKAs for most applications is to establish …

On the performance of group key agreement protocols

Y Amir, Y Kim, C Nita-Rotaru, G Tsudik - ACM Transactions on …, 2004 - dl.acm.org
Group key agreement is a fundamental building block for secure peer group communication
systems. Several group key management techniques were proposed in the last decade, all …