2018
DOI: 10.1016/j.future.2017.02.016
|View full text |Cite
|
Sign up to set email alerts
|

A variant of password authenticated key exchange protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(2 citation statements)
references
References 21 publications
0
2
0
Order By: Relevance
“…Thirdly, we need new conventions or protocols. There are already some protocols designed and put in place, like the ones in [139][140][141]. But new protocols that would on their own discover instances of trust and safety endangerments are sorely missing in the current structure of the fog.…”
Section: Discussionmentioning
confidence: 99%
“…Thirdly, we need new conventions or protocols. There are already some protocols designed and put in place, like the ones in [139][140][141]. But new protocols that would on their own discover instances of trust and safety endangerments are sorely missing in the current structure of the fog.…”
Section: Discussionmentioning
confidence: 99%
“…The proposal in [100] presents a variant of password authenticated key exchange protocol without password sharing for fog systems. In their proposal, a trusted authority provides public parameters in offline mode, two fog-users by using their wireless communication when they are proximate to each other, then they obtain a short-password by means of a key exchange algorithm (Diffie-Hellman key exchange), finally, the two proximate fog-users are authenticated to establish secure channel.…”
Section: Existing Fog Layer Security Proposalsmentioning
confidence: 99%