Ngoc Bao Tran

Learn More
Mutual authentication is vital concept to network security and incorporated to proprietary security solutions. In this paper, we present a new mutual authentication protocol based on graph isomorphism that can stop man-in-the-middle, session high-jacking and replay attacks. Although authentication protocol based on graph isomorphism was motivated by WLAN(More)
Graph isomorphism has received considerable attention because of many of the practical applications of the problem. Also, researchers have not yet been able to discover where the graph isomorphism problem fits into the NP complexity model. In this paper, we establish necessary conditions for graph isomorphism problem. Based on these conditions, algorithms(More)
  • 1