Sign Up to like & get
recommendations!
1
Published in 2019 at "Microsystem Technologies"
DOI: 10.1007/s00542-019-04518-9
Abstract: Increased use of internet demands substantial protection for secret image file from any adversary, specifically during transmission. In the field of cryptography there are two role models: cryptographer and crypt-analyst/attacker. The cryptographer develops techniques to…
read more here.
Keywords:
session key;
session;
cryptography;
image ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2017 at "International Journal of Information Security"
DOI: 10.1007/s10207-017-0389-6
Abstract: In this paper, we propose a two-round dynamic multi-cast key distribution (DMKD) protocol under the star topology with a central authentication server. Users can share a common session key without revealing any information of the…
read more here.
Keywords:
key;
cast key;
session key;
session ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-020-09027-w
Abstract: To prevent man-in-the-middle attack, Diffie-Hellman first proposed the concept of the session key exchange protocol, in which the author remove the long term keying material at the end of the session. In our scheme, we…
read more here.
Keywords:
scheme;
session key;
trusted third;
third party ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.2978100
Abstract: In recent years, Internet of Things (IoT) as an essential infrastructure for industrial development, environmental protection and human life enhancement has attracted researchers’ attention. Currently, there are four hot research topics in IoT fields, including…
read more here.
Keywords:
application;
session key;
session;
communication ... See more keywords