TTP based high-efficient multi-key exchange protocol
With a trusted-third-party (TTP)-based key exchange protocol, when a user would like to
transmit a message to another user, the transmitted data are encrypted by a session key …
transmit a message to another user, the transmitted data are encrypted by a session key …
A secure data encryption method employing a sequential–logic style mechanism for a cloud system
Recently, security problems have been the focuses of cloud computing research since
people worry that their data/files stored in a cloud system may be illegally accessed. Also …
people worry that their data/files stored in a cloud system may be illegally accessed. Also …
[HTML][HTML] A secure communication over wireless environments by using a data connection core
Recently, wireless networks, such as Wi-Fi and 3G, have been widely equipped and
popularly used in the world. People holding smart devices can conveniently access the …
popularly used in the world. People holding smart devices can conveniently access the …
Improving security level of LTE authentication and key agreement procedure
In recent years, LTE (Long Term Evolution) has been one of the mainstreams of current
wireless communication systems. But when its HSS authenticates UEs, the random number …
wireless communication systems. But when its HSS authenticates UEs, the random number …
A modified PKM environment for the security enhancement of IEEE 802.16 e
PK Panda, S Chattopadhyay - Computer Standards & Interfaces, 2019 - Elsevier
IEEE 802.16 standard developed Privacy Key Management (PKM) security protocol for
WiMAX. However, it still suffers from various attacks such as forgery attack, replay attack …
WiMAX. However, it still suffers from various attacks such as forgery attack, replay attack …
[PDF][PDF] Constructing a Secure Point-to-Point Wireless Environment by Integrating Diffie-Hellman PKDS RSA and Stream Ciphering for Users Known to Each Other.
Recently, wireless communication has been popularly used in our everyday life. However,
its security is a crucial work since messages are broadcasted via wireless channels through …
its security is a crucial work since messages are broadcasted via wireless channels through …
Building a block cipher mode of operation with feedback keys
In this paper, we propose two block cipher modes of operation (BCMO for short), named the
Key Stream Protection Chain mode (KSPC for short) and Output Dual Chaining mode (ODC …
Key Stream Protection Chain mode (KSPC for short) and Output Dual Chaining mode (ODC …
A secure wireless communication system integrating RSA, Diffie–Hellman PKDS, intelligent protection-key chains and a Data Connection Core in a 4G environment
In broadband wireless technology, due to having many salient advantages, such as high
data rates, quality of service, scalability, security, mobility, etc., LTE-A currently has been one …
data rates, quality of service, scalability, security, mobility, etc., LTE-A currently has been one …
A block cipher mode of operation with two keys
In this paper, we propose a novel block cipher mode of operation (BCMO for short), named
Output Protection Chain (OPC for short), which as a symmetric encryption structure is …
Output Protection Chain (OPC for short), which as a symmetric encryption structure is …
[PDF][PDF] Encryption of 4G mobile broadband systems
R Vafaei - 2014 - academia.edu
Mobile communication is the most popular technology that has developed from expensive
technology for some individuals to today's worldwide system used by majority of the people …
technology for some individuals to today's worldwide system used by majority of the people …