Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 4

Liczba wyników na stronie
first rewind previous Strona / 1 next fast forward last
Wyniki wyszukiwania
Wyszukiwano:
w słowach kluczowych:  key agreement
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 1 next fast forward last
EN
The article proposes a new energy-efficient protocol designed for star topology wireless sensor networks. The protocol has been implemented using ECC, although it can be easily adapted to any algebraic structure, where the discrete logarithm problem is computationally challenging. In addition to the formal description, the authors provide the results of an investigation concerned with the protocol's security properties, conducted by verifying the model using Scyther software. The publication also includes an analysis of the protocol's energy consumption, performed with the use of hardware platforms with ARM microcontrollers.
EN
Voice over Internet Protocol (VoIP) has been recently one of the more popular applications in Internet technology. It benefits lower cost of equipment, operation, and better integration with data applications than voice communications over telephone networks. However, the voice packets delivered over the Internet are not protected. The session initiation protocol (SIP) is widely used signaling protocol that controls communications on the Internet, typically using hypertext transport protocol (HTTP) digest authentication, which is vulnerable to many forms of attacks. This paper proposes a new secure authentication and key agreement scheme based on Digital Signature Algorithm (DSA) and Elliptic Curve Cryptography (ECC) named (ECDSA). Security analysis demonstrates that the proposed scheme can resist various attacks and it can be applied to authenticate the users with different SIP domains.
3
Content available remote Robust User Password Change Scheme based on the Elliptic Curve Cryptosystem
EN
In this paper, an efficient user password change scheme based on the elliptic curve discrete logarithm problem (ECDLP)is presented. In contrast to the existing password change schemes using a server’s public key, the proposed scheme can securely update user passwords without a complicated process and server’s public key, and also provides explicit key authentication in the case of a session key agreement.
4
Content available remote Enhanced of Key Agreement Protocols Resistant to a Denial-of-Service Attack
EN
The denial-of-service attack, a malicious client executes a key agreement protocol simultaneously many times to exhaust the server's memory or computing resource and to interfere the honest client connecting with the server. It is a serious problem in the key agreement protocol. A key agreement protocol which resists to the storage-exhaustion and the CPU-exhaustion attack was firstly proposed by Hiros-Matsuura. However, their protocol is not efficient enough during the weak key validation. Our proposed protocol modifies the weak key validation and avoids the unnecessary heavy computation to enhance the resistance of the denial-of-service attack. The most important contributions of our protocol are not only efficiently to resist CPU-exhaustion and memory-exhaustion attacks but also prevent bandwidth consumption.
first rewind previous Strona / 1 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.