搜索结果: 1-6 共查到“军事学 Multiple key”相关记录6条 . 查询时间(0.171 秒)
Authenticated Multiple Key Establishment Protocol for Wireless Sensor Networks
Sensor Networks Key Establishment
2014/3/6
The article proposes a provably secure authenticated multiple key establishment protocol for Wireless Sensor Network. Security of the protocol is based on the computational infeasiblity of solving Ell...
Security of Multiple-Key Agreement Protocols and Propose an Enhanced Protocol
agreement protocols Multiple-key agreement protocols Signature schemes
2012/6/14
Multiple key agreement protocols produce several session keys instead of one session key. Most of the multiple key agreement protocols do not utilize the hash functions in the signature schemes used f...
Security of Multiple-Key Agreement Protocols and Propose an Enhanced Protocol
cryptographic protocols / agreement protocols Multiple-key agreement protocols Signature schemes
2012/3/22
Multiple key agreement protocols produce several session keys instead of one session key. Most of the multiple key agreement protocols do not utilize the hash functions in the signature schemes used f...
Security of Multiple-Key Agreement Protocols and Propose an Enhanced Protocol
cryptographic protocols / agreement protocols Multiple-key agreement protocols Signature schemes
2012/3/21
Multiple key agreement protocols produce several session keys instead of one session key. Most of the multiple key agreement protocols do not utilize the hash functions in the signature schemes used f...
Two improved authenticated multiple key exchange protocols
Cryptography authentication key exchange security Bilinear pairing
2010/7/13
Many authenticated multiple key exchange protocols were published in recent years. In 2008, Lee et al. presented an authenticated multiple key exchange protocol based on bilinear pairings. However, Vo...
Weakness of Shim’s New ID-based Tripartite Multiple-key Agreement Protocol
ID-based Weil-paring impersonation attack
2009/3/19
In this article we show that Shim’s new ID-based tripartite multiple-key agreement protocol still suffers from the impersonation attack, a malicious user can launch an impersonation attack on their pr...