Authentication and key distribution protocol for distributed computer environment

被引:0
|
作者
Sun, Xiaorong [1 ]
Wang, Yumin [1 ]
机构
[1] Xidian Univ, Xi'an, China
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:577 / 581
相关论文
共 50 条
  • [1] Cryptanalysis of an authentication and key distribution protocol
    Tamkang Univ, Taipei, Taiwan
    Commun Lett, 1 (7-8):
  • [2] Cryptanalysis of an authentication and key distribution protocol
    Yen, SM
    IEEE COMMUNICATIONS LETTERS, 1999, 3 (01) : 7 - 8
  • [3] Authentication and key distribution protocol in UPT system
    Zhu, Yujun
    Lin, Xiaodong
    Liao, Jianxin
    Chen, Junliang
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 1999, 27 (07): : 51 - 54
  • [4] Weaknesses in EHA authentication and key distribution protocol
    Stanek, M
    Olejár, D
    SECURE INFORMATION NETWORKS: COMMUNICATIONS AND MULTIMEDIA SECURITY, 1999, 23 : 87 - 95
  • [5] Active Authentication Protocol for IoV Environment with Distributed Servers
    Manikandan, Saravanan
    Rahaman, Mosiur
    Song, Yu-Lin
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (03): : 5789 - 5808
  • [6] Active Authentication Protocol for IoV Environment with Distributed Servers
    Manikandan, Saravanan
    Rahaman, Mosiur
    Song, Yu-Lin
    Computers, Materials and Continua, 2022, 73 (03): : 5789 - 5808
  • [7] Distributed utility based User Authentication protocol for multi-server environment with key agreement utility
    Anand, Darpan
    Khemchandani, Vineeta
    2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL PERFORMANCE EVALUATION (COMPE-2021), 2021, : 415 - 420
  • [8] Distributed authentication and key agreement protocol for ad hoc network
    Mo, Yijun
    Wang, Fei
    Huang, BenXiong
    Xu, Shuhua
    9TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: TOWARD NETWORK INNOVATION BEYOND EVOLUTION, VOLS 1-3, 2007, : 2047 - +
  • [9] An enhanced quantum key distribution protocol for security authentication
    Kumar, Ankit
    Dadheech, Pankaj
    Singh, Vijander
    Raja, Linesh
    Poonia, Ramesh C.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (04): : 499 - 507
  • [10] Key distribution and authentication protocol for secure wireless conferencing
    Jain, R
    IETE TECHNICAL REVIEW, 1998, 15 (06) : 471 - 476