Cargando…
A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants
The existence of malicious participants is a major threat for authenticated group key exchange (AGKE) protocols. Typically, there are two detecting ways (passive and active) to resist malicious participants in AGKE protocols. In 2012, the revocable identity- (ID-) based public key system (R-IDPKS) w...
Autores principales: | Wu, Tsu-Yang, Tsai, Tung-Tso, Tseng, Yuh-Min |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Hindawi Publishing Corporation
2014
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4058815/ https://www.ncbi.nlm.nih.gov/pubmed/24991641 http://dx.doi.org/10.1155/2014/367264 |
Ejemplares similares
-
An Efficient and Provable Secure Revocable Identity-Based Encryption Scheme
por: Wang, Changji, et al.
Publicado: (2014) -
Password-Only Authenticated Three-Party Key Exchange with Provable Security in the Standard Model
por: Nam, Junghyun, et al.
Publicado: (2014) -
Provably Secure Mutual Authentication and Key Agreement Scheme Using PUF in Internet of Drones Deployments
por: Park, Yohan, et al.
Publicado: (2023) -
An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System
por: Li, Chun-Ta, et al.
Publicado: (2017) -
A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks
por: Nam, Junghyun, et al.
Publicado: (2014)