Jianmin Ding

  • Citations Per Year
Learn More
Quite recently, Yang et al. presented an efficient three-party authenticated key exchange protocol based upon elliptic curve cryptography for mobile-commerce environments. In this paper, we demonstrate that Yang et al's three-party authenticated protocol is potentially vulnerable to an unknown key-share attack. Thereafter, we suggest a countermeasure to(More)
The SLA auto-management technology is an emerging research field and it is important for the construction of next generation computing environment under the background of SOA and cloud computing. In this paper, we at first review 28 recent works focused on SLA management and analyze the requirements of SLA auto-management, and then we define a complete(More)
Recently, Abdalla and Pointcheval proposed an efficient three-party password-authenticated key exchange protocoland provided a proof of security in the Bellare, Pointcheval, and Rogaway (BPR2000) model. Despite the claim of provable security, the protocol was subsequently shown insecure in them presence of an active adversary by Kim-Kwang et al. But they(More)
  • 1