An compiler for effective group key exchange protocol to resist insider attack

被引:0
|
作者
Zhang, Zijian [1 ]
Zhu, Liehuang [1 ]
Liao, Lejian [1 ]
机构
[1] School of Computer Science and Technology, Beijing Institute of Technology, Beijing 100081, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:313 / 317
相关论文
共 50 条
  • [21] Key Exchange Protocol for WSN Resilient against Man in the Middle Attack
    Saqib, Najmus
    2016 IEEE INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER APPLICATIONS (ICACA), 2016, : 265 - 269
  • [22] An effective attack on the quantum key distribution protocol based on quantum encryption
    Gao, F
    Qin, SJ
    Wen, QY
    Zhu, FC
    INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2005, 3822 : 302 - 312
  • [23] Insider impersonation-MIM attack to tripartite key agreement scheme and an efficient protocol for multiple keys
    Wang, LH
    Okamoto, T
    Takagi, T
    Okamoto, E
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 198 - 203
  • [24] Password-based group key exchange secure against insider guessing attacks
    Byun, JW
    Lee, DH
    Lim, J
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 143 - 148
  • [25] Outsider Key Compromise Impersonation Attack on a Multi-factor Authenticated Key Exchange Protocol
    Ma, Zhiqiang
    He, Jun
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2022, 2022, 13285 : 320 - 337
  • [26] Universally Composable Symbolic Analysis of Group Key Exchange Protocol
    Zhang Zijian
    Zhu Liehuang
    Liao Lejian
    CHINA COMMUNICATIONS, 2011, 8 (02) : 59 - 65
  • [27] Cryptanalysis of Tseng-Wu group key exchange protocol
    Department of Computer Science and Information Engineering, Asia University, No. 500, Lioufeng Rd., Wufeng, Taichung
    41354, Taiwan
    不详
    40402, Taiwan
    Int. J. Netw. Secur., 3 (590-593):
  • [28] Security Improvement on a Group Key Exchange Protocol for Mobile Networks
    Nam, Junghyun
    Lee, Kwangwoo
    Paik, Juryon
    Paik, Woojin
    Won, Dongho
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2011, PT IV, 2011, 6785 : 123 - 132
  • [29] A key exchange protocol using matrices over group ring
    Gupta, Indivar
    Pandey, Atul
    Dubey, Manish Kant
    ASIAN-EUROPEAN JOURNAL OF MATHEMATICS, 2019, 12 (05)
  • [30] An algebraic attack on the key exchange protocol based upon a modified tropical structure
    Jackson, J.
    Perumal, R.
    INFORMATION AND COMPUTATION, 2025, 303