Cited By
View all- Cao ZYe H(2025)Comment on “Efficient design of an authenticated key agreement protocol for dew-assisted IoT systems”The Journal of Supercomputing10.1007/s11227-024-06661-181:1Online publication date: 1-Jan-2025
Authentication schemes present a user-friendly and scalable mechanism to establish the secure and authorized communication between the remote entities over the insecure public network. Later, several authentication schemes have proposed in the ...
Since the first practical and secure public-key encryption scheme without random oracles proposed by Cramer and Shoup in 1998, Cramer-Shoup's scheme and its variants remained the only practical and secure public-key encryption scheme without random ...
In 2011, Zhao et al. presented a new security model of group key agreement GKA by considering ephemeral secret leakage ESL attacks. Meanwhile, they proposed a strongly secure GKA protocol under the new model. In this paper, two security weaknesses on ...
John Wiley and Sons Ltd.
United Kingdom