Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,400,054 papers from all fields of science
Search
Sign In
Create Free Account
Key-agreement protocol
Known as:
Key agreement
, Key agreement protocol
In cryptography, a key-agreement protocol is a protocol whereby two or more parties can agree on a key in such a way that both influence the outcome…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
38 relations
Alice and Bob
Bluetooth
Certificate authority
Computer security
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Robust three-factor remote user authentication scheme with key agreement for multimedia systems
Xiong Li
,
J. Niu
,
M. Khan
,
Junguo Liao
,
Xiaoke Zhao
Secur. Commun. Networks
2016
Corpus ID: 4024637
As the fast growth of multimedia information, the security of multimedia systems is becoming a rather important topic nowadays…
Expand
Highly Cited
2011
Highly Cited
2011
A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks
Chun-Ta Li
,
M. Hwang
Information Sciences
2011
Corpus ID: 11133949
2010
2010
Authenticated Asymmetric Group Key Agreement Protocol and Its Application
Lei Zhang
,
Qianhong Wu
,
Bo Qin
IEEE International Conference on Communications
2010
Corpus ID: 29849498
A recent primitive known as asymmetric group key agreement allows a group of users to negotiate a common encryption key which is…
Expand
2009
2009
A New Client-to-Client Password-Authenticated Key Agreement Protocol
D. Feng
,
Jing Xu
International Workshop on Coding and Cryptology
2009
Corpus ID: 7914359
Client-to-client password-authenticated key agreement (C2C-PAKA) protocol deals with the authenticated key agreement process…
Expand
2009
2009
A Provably Secure Two-Party Attribute-Based Key Agreement Protocol
Hao Wang
,
Qiuliang Xu
,
Tao Ban
Fifth International Conference on Intelligent…
2009
Corpus ID: 11482690
In this paper, we present a two-party attribute-based key agreement protocol, which is secure in random oracle model under the…
Expand
2006
2006
An Authenticated Key Agreement Protocol for Mobile Ad Hoc Networks
X. Zou
,
Amandeep Thukral
,
B. Ramamurthy
International Conference on Mobile Ad-hoc and…
2006
Corpus ID: 18305136
The growing popularity of wireless ad hoc networks has brought increasing attention to many security issues for such networks. A…
Expand
2005
2005
A communication-efficient key agreement protocol in ad hoc networks
Hongsong Shi
,
Mingxing He
International Conference on Wireless Networks…
2005
Corpus ID: 18132596
A secure communication-efficient key agreement protocol based on the bilinear pairings in ad hoc networks is proposed. In this…
Expand
2003
2003
ID-based tripartite key agreement with signatures
Divya Nalla
IACR Cryptology ePrint Archive
2003
Corpus ID: 17906589
This paper proposes a new identity based tripartite key agreement protocol which is more efficient than the existing ID-based…
Expand
2003
2003
Cryptanalysis of ID-based Tripartite Authenticated Key Agreement Protocols
Kyung-Ah Shim
IACR Cryptology ePrint Archive
2003
Corpus ID: 37965714
In this paper, we show that the Nalla-Reddy’s one round IDbased tripartite authenticated key agreement protocols are still…
Expand
2002
2002
Simple authenticated key agreement protocol resistant to password guessing attacks
Her-Tyan Yeh
,
Hung-Min Sun
OPSR
2002
Corpus ID: 16958390
Password-based mechanism is the widely used method for user authentication. Many password-based authenticated key exchange…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE