The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, Jeong et al. proposed a strong Diffie-Hellman-DSA key exchange scheme providing security against session state reveal attacks as well as forward secrecy and key independence. The current paper proposes an efficient Diffie-Hellman-MAC key exchange scheme providing same securities. The proposed scheme is based on the keyed MAC hash function to provide efficiency.
Generally, a remote autonomous object acts with its own thread of control. In 2003, Novikov and Kiselev proposed an authentication scheme of the user from the remote autonomous object with public key cryptosystem which is applicable in the telecommunications system. In 2005, Yang et al.,however, has pointed out that the Novikov-Kiselev scheme is insecure against the man-in-the-middle attack. This...
In 2008, Zhu-Wu showed that the redefined Liawpsilas broadcasting cryptosystem is still insecure in that an unauthorized user is able to obtain the shared secret, which is only intended for certain privileged users. However, Zhu-Wu did not provide an improvement of the redefined Liawpsilas broadcasting cryptosystem. In addition, we found that the redefined Liawpsilas broadcasting cryptosystem has...
As there is growth in the need of applications such as video conferencing and interactive chatting, secure group communication is an important research area. Security in these applications is necessary to provide services like privacy, data-integrity, and non-repudiation to group members. A naive way to achieve security in such groups is to have a secret key among every node. This task is achieved...
Recently, secure group-oriented applications have grown very rapidly. In order to provide secure group communication, WMNs (Wireless Mesh Network) are required to establish a secret key which is shared with all participants. Recently, Tseng proposed an authenticated group key agreement for regarding mobile networks. This mobile network is an asymmetric wireless network which includes many low-power...
In 2006, Shao et al. showed that Wang et al.'s deniable authentication protocol based on ElGamal cryptography is insecure to a person-in-the-middle attack; that is, in the whole process, the receiver cannot be aware of the existence of this adversary as well as the modification of the messages. Furthermore, they also presented a modification of Wang et al.'s protocol to overcome the security flaw...
In 2004, Hsieh and Sun showed that Fan et al.'s deniable protocol does not posse the denial property; that is, a cheating receiver can prove the source of the received message to a third party. Furthermore, they also presented a modification of Fan et al.'s protocol to overcome the security flaw. However, the current paper points out an error in Hsieh-Sun's cryptanalysis on Fan et al.'s deniable authentication...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.