Organisational security culture: Extending the end-user perspective
AB Ruighaver, SB Maynard, S Chang - Computers & security, 2007 - Elsevier
The concept of security culture is relatively new. It is often investigated in a simplistic manner
focusing on end-users and on the technical aspects of security. Security, however, is a …
focusing on end-users and on the technical aspects of security. Security, however, is a …
Quantum key agreement protocol based on BB84
SK Chong, T Hwang - Optics Communications, 2010 - Elsevier
This work presents a quantum key agreement (QKA) based on the BB84 protocol. The newly
proposed QKA protocol enables two involved parties to jointly establish a shared secret key …
proposed QKA protocol enables two involved parties to jointly establish a shared secret key …
Cryptanalysis of password authentication schemes: Current status and key issues
Password is the most commonly used technique for user authentication due to its simplicity
and convenience. The main advantage of passwords is that users can memorize them easily …
and convenience. The main advantage of passwords is that users can memorize them easily …
A communication-efficient three-party password authenticated key exchange protocol
Three-party password authenticated key exchange (3PAKE) protocols allow two users
(clients) to establish a session key through an authentication server over an insecure …
(clients) to establish a session key through an authentication server over an insecure …
Efficient verifier-based password-authenticated key exchange in the three-party setting
In the last few years, researchers have extensively studied the password-authenticated key
exchange (PAKE) in the three-party setting. The fundamental security goal of PAKE is …
exchange (PAKE) in the three-party setting. The fundamental security goal of PAKE is …
[HTML][HTML] An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments
In the literature, many three-party authenticated key exchange (3PAKE) protocols are put
forwarded to established a secure session key between two users with the help of trusted …
forwarded to established a secure session key between two users with the help of trusted …
Cryptanalysis of simple three-party key exchange protocol
Recently, Lu and Cao published a novel protocol for password-based authenticated key
exchanges (PAKE) in a three-party setting in Journal of Computers and Security, where two …
exchanges (PAKE) in a three-party setting in Journal of Computers and Security, where two …
SL3PAKE: simple lattice-based three-party password authenticated key exchange for post-quantum world
Abstract Three-party Password Authenticated Key Exchange (3PAKE) is a protocol where
two parties generate the same session key with the help of a trusted server. With the …
two parties generate the same session key with the help of a trusted server. With the …
Quantum identity authentication scheme of vehicular ad-hoc networks
Z Chen, K Zhou, Q Liao - International Journal of Theoretical Physics, 2019 - Springer
With the development of the intelligent transportation system (ITS) and increasing
application of vehicular ad-hoc networks (VANETs), the security of VANETs has become a …
application of vehicular ad-hoc networks (VANETs), the security of VANETs has become a …