Articles with "agreement protocol" as a keyword



Photo by hudsoncrafted from unsplash

Cryptanalysis of a multiparty quantum key agreement protocol based on commutative encryption

Sign Up to like & get
recommendations!
Published in 2017 at "Quantum Information Processing"

DOI: 10.1007/s11128-017-1647-2

Abstract: Recently, Sun et al. (Quantum Inf Process 15(5):2101–2111, 2016) proposed an efficient multiparty quantum key agreement protocol based on commutative encryption. The aim of this protocol is to negotiate a secret shared key among multiple… read more here.

Keywords: quantum; multiparty quantum; key agreement; protocol ... See more keywords
Photo by papaioannou_kostas from unsplash

An Efficient Chaotic Maps-Based Deniable Authentication Group Key Agreement Protocol

Sign Up to like & get
recommendations!
Published in 2017 at "Wireless Personal Communications"

DOI: 10.1007/s11277-017-4163-x

Abstract: Abstract More than two participants implement communication over the network at the same time, aiming to establish a common session key, and it is named group session communication. Nowadays, many researchers lay emphasis on achieve… read more here.

Keywords: key agreement; authentication; group; protocol ... See more keywords
Photo by adigold1 from unsplash

A Secure Key Agreement Protocol Defiant to Denial-of-Service Attack based on Three Party Authentication

Sign Up to like & get
recommendations!
Published in 2021 at "Journal of The Institution of Engineers (India): Series B"

DOI: 10.1007/s40031-021-00673-8

Abstract: To perform the secure communication over the insecure channel, Key Agreement Protocol is a prominent approach to generate the session key between the communication parties. Since the last two decades, researchers came up with various… read more here.

Keywords: three party; agreement; based three; key agreement ... See more keywords
Photo by cytonn_photography from unsplash

A Novel Key Agreement Protocol Based on RET Gadget Chains for Preventing Reused Code Attacks

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2879852

Abstract: Attackers exploit vulnerabilities to change RET gadget chains and control the order of program execution, threatening the security of software implementations. For example, memory overflow attacks and remote shellcode attacks will lead to the leak… read more here.

Keywords: agreement; code; key agreement; novel key ... See more keywords
Photo by papaioannou_kostas from unsplash

An authenticated hierarchical asymmetric group key agreement protocol based on identity

Sign Up to like & get
recommendations!
Published in 2019 at "International Journal of Embedded Systems"

DOI: 10.1504/ijes.2019.10025637

Abstract: Asymmetric group key agreement protocol is to negotiate a shared group encryption key. Each member can calculate a decryption key corresponding to the encryption key. With the rapid development of network and system technology, secure… read more here.

Keywords: key agreement; group; agreement protocol; group key ... See more keywords
Photo from wikipedia

SLAs for cloud applications: agreement protocol and REST-based implementation

Sign Up to like & get
recommendations!
Published in 2017 at "International Journal of Grid and Utility Computing"

DOI: 10.1504/ijguc.2017.085910

Abstract: Users with critical data are still reluctant to move apps and data to commercial clouds, showing a substantial lack of trust in providers. Possible risks linked to availability, performance and security may be mitigated by… read more here.

Keywords: agreement; agreement protocol; slas cloud; rest based ... See more keywords