Performance evaluation of a new hybrid encryption protocol for authentication and key distribution

被引:0
|
作者
El-Hadidi, M.T. [1 ]
Hegazi, N.H. [1 ]
Aslan, H.K. [1 ]
机构
[1] Cairo Univ, Cairo, Egypt
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:16 / 22
相关论文
共 50 条
  • [1] Performance evaluation of a new hybrid encryption protocol for authentication and key distribution
    El-Hadidi, MT
    Hegazi, NH
    Asian, HK
    IEEE INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 1999, : 16 - 22
  • [2] New hybrid encryption protocol for authentication and its analysis
    Xu, Xiaodong
    Jing, Jiwu
    Ruan, Yaoping
    Jisuanji Gongcheng/Computer Engineering, 2000, 26 (02): : 72 - 74
  • [3] AUTHMAC_DH: A new protocol for authentication and key distribution
    Aslan, HK
    COMMUNICATIONS AND MULTIMEDIA SECURITY, 2003, 2828 : 14 - 26
  • [4] Cryptanalysis of an authentication and key distribution protocol
    Tamkang Univ, Taipei, Taiwan
    Commun Lett, 1 (7-8):
  • [5] Cryptanalysis of an authentication and key distribution protocol
    Yen, SM
    IEEE COMMUNICATIONS LETTERS, 1999, 3 (01) : 7 - 8
  • [6] Performance analysis of IPSec protocol: Encryption and authentication
    Elkeelany, O
    Matalgah, MM
    Sheikh, KP
    Thaker, M
    Chaudhry, G
    Medhi, D
    Qaddour, J
    2002 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2002, : 1164 - 1168
  • [7] A public key encryption authentication new protocol by using the third party for mobile communication
    Li, FW
    Chen, GH
    ICCC2004: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION VOL 1AND 2, 2004, : 1064 - 1069
  • [8] A new mutual authentication and key distribution protocol for mobile communication environments
    Cho, D
    Jun, J
    Won, D
    PROCEEDINGS OF THE FIFTH JOINT CONFERENCE ON INFORMATION SCIENCES, VOLS 1 AND 2, 2000, : 333 - 336
  • [9] Authentication and key distribution protocol in UPT system
    Zhu, Yujun
    Lin, Xiaodong
    Liao, Jianxin
    Chen, Junliang
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 1999, 27 (07): : 51 - 54
  • [10] Weaknesses in EHA authentication and key distribution protocol
    Stanek, M
    Olejár, D
    SECURE INFORMATION NETWORKS: COMMUNICATIONS AND MULTIMEDIA SECURITY, 1999, 23 : 87 - 95