![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Open AccessConstructing UC Secure and Constant-Round Group Key Exchange Protocols via Secret Sharing
Group key exchange (GKE) is one of the basic building blocks in securing group communication. A number of solutions to GKE problem have been proposed, but most of them are not scalable and require a number of ...
-
Chapter and Conference Paper
A New Formal Proof Model for RFID Location Privacy
The privacy and security problems in RFID systems have been extensively studied. However, less research has been done on formal analysis of RFID security. The existing adversarial models proposed in the litera...
-
Chapter and Conference Paper
Low-Cost and Strong-Security RFID Authentication Protocol
This paper proposes a low-cost and strong-security RFID protocol to reduce the computational load on both the back-end database and the tags in an RFID system. When desynchronization occurs as a result of a co...
-
Chapter and Conference Paper
HGLAP – Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed RFID System
This paper presents a low-cost and secure authentication protocol to reduce the computational load on both the back-end database and the tags in a distributed RFID system. The proposed protocol is based on a h...
-
Chapter and Conference Paper
Security Analysis of the Authentication Modules of Chinese WLAN Standard and Its Implementation Plan
With the Canetti-Krawczyk (CK) model, we analyze the authentication module WAIs in the Chinese WLAN national security standard WAPI and its implementation plan respectively. The security weaknesses of WAI in t...
-
Chapter and Conference Paper
On the Security of the Authentication Module of Chinese WLAN Standard Implementation Plan
Compared with the original standard, the greatest change that WAPI (Chinese WLAN security standard) implementation plan made lies in the key-agreement protocol in WAI (Wireless Authentication Infrastructure). ...
-
Chapter and Conference Paper
Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves
Joux’s tripartite key agreement protocol is one of the most prominent developments in the area of key agreement. Although certificate-based and ID-based authentication schemes have been proposed to provide aut...
-
Chapter and Conference Paper
Efficient Distributed Signcryption Scheme as Group Signcryption
The existing distributed signcryption is designed for distributing a signcrypted message to a designated group. However, it does not provide confidentiality of sender ID and its extension to a group signcrypti...