Analysis of One Secure Key Agreement and Key Protection for Mobile Device User Authentication

被引:0
|
作者
Liu, Lihua [1 ]
Hong, Leming [1 ]
Cao, Zhengjun [2 ]
机构
[1] Department of Mathematics, Shanghai Maritime University, No.1550,Haigang Ave, Shanghai, China
[2] Department of Mathematics, Shanghai University, No.99,Shangda Road, Shanghai,200444, China
关键词
Compendex;
D O I
暂无
中图分类号
学科分类号
摘要
Authentication
引用
收藏
页码:238 / 242
相关论文
共 50 条
  • [41] Lightweight secure authentication and key agreement technique for smart grid
    Kumari, Disuja
    Singh, Karan
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (01) : 451 - 478
  • [42] Highly secure authentication and key agreement protocol for the internet of vehicles
    Li, Li
    Fan, Xingjuan
    Zhi, Boyuan
    Li, Shaojun
    Dabollahi, Seyyed Amirreza
    TELECOMMUNICATION SYSTEMS, 2024, 87 (01) : 73 - 88
  • [43] Lightweight secure authentication and key agreement technique for smart grid
    Disuja Kumari
    Karan Singh
    Peer-to-Peer Networking and Applications, 2024, 17 : 451 - 478
  • [44] A More Secure and Efficient Remote Authentication Scheme with Key Agreement
    Guo, Dianli
    Wen, Fengtong
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ELECTRIC AND ELECTRONICS, 2013, : 119 - 122
  • [45] SAKA: a secure authentication and key agreement protocol for GSM networks
    Neetesh Saxena
    Narendra S. Chaudhari
    CSI Transactions on ICT, 2013, 1 (4) : 331 - 341
  • [46] A secure and efficient key agreement framework for critical energy infrastructure using mobile device
    Akber Ali Khan
    Vinod Kumar
    Musheer Ahmad
    B. B. Gupta
    Musheer Ahmad
    Ahmed A. Abd El-Latif
    Telecommunication Systems, 2021, 78 : 539 - 557
  • [47] A secure and efficient key agreement framework for critical energy infrastructure using mobile device
    Khan, Akber Ali
    Kumar, Vinod
    Ahmad, Musheer
    Gupta, B. B.
    Ahmad, Musheer
    Abd El-Latif, Ahmed A.
    TELECOMMUNICATION SYSTEMS, 2021, 78 (04) : 539 - 557
  • [48] Secure Key Management Based Mobile Authentication in Cloud
    Priya, S. Shanmuga
    Yuvaraj, D.
    Murthy, T. Satyanarayana
    Chooralil, Varghese S.
    Krishnan, S. Navaneetha
    Banumathy, P.
    SundaraVadivel, P.
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 43 (03): : 887 - 896
  • [49] A secure verifiable key agreement protocol for mobile conferencing
    Saha, Mounita
    RoyChowdhury, Dipanwita
    Sengupta, Indranil
    2008 3RD INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEM SOFTWARE AND MIDDLEWARE AND WORKSHOPS, VOLS 1 AND 2, 2008, : 219 - 222
  • [50] A Privacy Protection User Authentication and Key Agreement Scheme Tailored for the Internet of Things Environment: PriAuth
    Chen, Yuwen
    Martinez, Jose-Fernan
    Castillejo, Pedro
    Lopez, Lourdes
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2017,