In this book, we study the ID-based key agreement protocol from pairings, which contains two subjects: (1) ID-based mutual authentication and key exchange (ID-MAKE) protocol for mobile client-server environments; (2) ID-based authenticated group key exchange (ID-AGKE) protocol with resisting to malicious participants. In the first subject, we propose two secure ID-MAKE protocols. In the second subject, we first propose a security analysis of the previously presented ID-AGKE protocol. Then, two robust ID-AGKE protocols with resisting malicious participants are proposed. Finally, we provide formal security proofs to demonstrate that the proposed four protocols are provably secure.
"synopsis" may belong to another edition of this title.
Tsu-Yang Wu received his PhD degree in mathematics from National Changhua University of Education in 2010. He is an associate professor in College of Information Science and Engineering at Fujian University of Technology, China. His research interests include Cryptography and Network security
"About this title" may belong to another edition of this title.
£ 9.61 shipping from Germany to United Kingdom
Destination, rates & speedsSeller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -In this book, we study the ID-based key agreement protocol from pairings, which contains two subjects: (1) ID-based mutual authentication and key exchange (ID-MAKE) protocol for mobile client-server environments; (2) ID-based authenticated group key exchange (ID-AGKE) protocol with resisting to malicious participants. In the first subject, we propose two secure ID-MAKE protocols. In the second subject, we first propose a security analysis of the previously presented ID-AGKE protocol. Then, two robust ID-AGKE protocols with resisting malicious participants are proposed. Finally, we provide formal security proofs to demonstrate that the proposed four protocols are provably secure. 128 pp. Englisch. Seller Inventory # 9783330822887
Quantity: 2 available
Seller: AHA-BUCH GmbH, Einbeck, Germany
Taschenbuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - In this book, we study the ID-based key agreement protocol from pairings, which contains two subjects: (1) ID-based mutual authentication and key exchange (ID-MAKE) protocol for mobile client-server environments; (2) ID-based authenticated group key exchange (ID-AGKE) protocol with resisting to malicious participants. In the first subject, we propose two secure ID-MAKE protocols. In the second subject, we first propose a security analysis of the previously presented ID-AGKE protocol. Then, two robust ID-AGKE protocols with resisting malicious participants are proposed. Finally, we provide formal security proofs to demonstrate that the proposed four protocols are provably secure. Seller Inventory # 9783330822887
Quantity: 1 available
Seller: Revaluation Books, Exeter, United Kingdom
Paperback. Condition: Brand New. 128 pages. 8.66x5.91x0.29 inches. In Stock. Seller Inventory # 3330822880
Quantity: 1 available
Seller: moluna, Greven, Germany
Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Über den AutorrnrnTsu-Yang Wu received his PhD degree in mathematics from National Changhua University of Education in 2010. He is an associate professor in College of Information Science and Engineering at Fujian University of Technology, . Seller Inventory # 510068340
Quantity: Over 20 available
Seller: buchversandmimpf2000, Emtmannsberg, BAYE, Germany
Taschenbuch. Condition: Neu. Neuware -In this book, we study the ID-based key agreement protocol from pairings, which contains two subjects: (1) ID-based mutual authentication and key exchange (ID-MAKE) protocol for mobile client-server environments; (2) ID-based authenticated group key exchange (ID-AGKE) protocol with resisting to malicious participants. In the first subject, we propose two secure ID-MAKE protocols. In the second subject, we first propose a security analysis of the previously presented ID-AGKE protocol. Then, two robust ID-AGKE protocols with resisting malicious participants are proposed. Finally, we provide formal security proofs to demonstrate that the proposed four protocols are provably secure.VDM Verlag, Dudweiler Landstraße 99, 66123 Saarbrücken 128 pp. Englisch. Seller Inventory # 9783330822887
Quantity: 2 available