检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:Areej Omar Baalghusun Olfa Fahad Abusalem Zahra Abbas Al Abbas Jayaprakash Kar
机构地区:[1]Department of Information Technology, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, KSA [2]Department of Information Systems, Information Security Research Group, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, KSA
出 处:《Journal of Information Security》2015年第1期51-58,共8页信息安全(英文)
摘 要:One of the most important and challenging cryptographic primitives in Public Key Cryptography is Key Agreement Protocol where two or more parties share secret values and establish the session key. Many authors have proposed key agreement protocols. In this article, we have viewed some authenticated Key Agreement Protocols and presented a comparative study. We have also described the design principle, security requirement and various attacks on Key Agreement Protocol.One of the most important and challenging cryptographic primitives in Public Key Cryptography is Key Agreement Protocol where two or more parties share secret values and establish the session key. Many authors have proposed key agreement protocols. In this article, we have viewed some authenticated Key Agreement Protocols and presented a comparative study. We have also described the design principle, security requirement and various attacks on Key Agreement Protocol.
关 键 词:Impersonation RESILIENCE PRIME FACTORIZATION ECDLP TRAPDOOR Function
分 类 号:TN91[电子电信—通信与信息系统]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.222