Organisational security culture: Extending the end-user perspective

AB Ruighaver, SB Maynard, S Chang - Computers & security, 2007 - Elsevier
The concept of security culture is relatively new. It is often investigated in a simplistic manner
focusing on end-users and on the technical aspects of security. Security, however, is a …

Quantum key agreement protocol based on BB84

SK Chong, T Hwang - Optics Communications, 2010 - Elsevier
This work presents a quantum key agreement (QKA) based on the BB84 protocol. The newly
proposed QKA protocol enables two involved parties to jointly establish a shared secret key …

Cryptanalysis of password authentication schemes: Current status and key issues

SK Sood, AK Sarje, K Singh - 2009 Proceeding of International …, 2009 - ieeexplore.ieee.org
Password is the most commonly used technique for user authentication due to its simplicity
and convenience. The main advantage of passwords is that users can memorize them easily …

Simple three-party key exchange protocol

R Lu, Z Cao - Computers & Security, 2007 - Elsevier
Three-party authenticated key exchange protocol is an important cryptographic technique in
the secure communication areas, by which two clients, each shares a human-memorable …

A communication-efficient three-party password authenticated key exchange protocol

TY Chang, MS Hwang, WP Yang - Information Sciences, 2011 - Elsevier
Three-party password authenticated key exchange (3PAKE) protocols allow two users
(clients) to establish a session key through an authentication server over an insecure …

Efficient verifier-based password-authenticated key exchange in the three-party setting

JO Kwon, IR Jeong, K Sakurai, DH Lee - Computer Standards & Interfaces, 2007 - Elsevier
In the last few years, researchers have extensively studied the password-authenticated key
exchange (PAKE) in the three-party setting. The fundamental security goal of PAKE is …

[HTML][HTML] An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments

SKH Islam, R Amin, GP Biswas, MS Farash, X Li… - Journal of King Saud …, 2017 - Elsevier
In the literature, many three-party authenticated key exchange (3PAKE) protocols are put
forwarded to established a secure session key between two users with the help of trusted …

Cryptanalysis of simple three-party key exchange protocol

H Guo, Z Li, Y Mu, X Zhang - Computers & Security, 2008 - Elsevier
Recently, Lu and Cao published a novel protocol for password-based authenticated key
exchanges (PAKE) in a three-party setting in Journal of Computers and Security, where two …

SL3PAKE: simple lattice-based three-party password authenticated key exchange for post-quantum world

V Dabra, S Kumari, A Bala, S Yadav - Journal of Information Security and …, 2024 - Elsevier
Abstract Three-party Password Authenticated Key Exchange (3PAKE) is a protocol where
two parties generate the same session key with the help of a trusted server. With the …

Quantum identity authentication scheme of vehicular ad-hoc networks

Z Chen, K Zhou, Q Liao - International Journal of Theoretical Physics, 2019 - Springer
With the development of the intelligent transportation system (ITS) and increasing
application of vehicular ad-hoc networks (VANETs), the security of VANETs has become a …