2018
DOI: 10.1007/s12652-018-1029-3
|View full text |Cite
|
Sign up to set email alerts
|

Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
55
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
8
2

Relationship

1
9

Authors

Journals

citations
Cited by 126 publications
(56 citation statements)
references
References 19 publications
0
55
0
1
Order By: Relevance
“…Jia et al designed an identity-based anonymous authentication key agreement protocol for the mobile edge computing (MEC) environment, the protocol implements mutual authentication in a single message exchange round and ensures user anonymity and untraceability, but they did not consider other security properties affected by changes in environmental factors [19,20]. Chen et al proposed a new three-party password-based authentication key exchange protocol to ensure the security of key exchange in wireless communication, their communication cost is acceptable but they used personal smart devices instead of arbitrary IoT devices for evaluation [21]. These methods basically use the idea of traditional authentication methods using cryptographic primitives for authentication in the IoT environment.…”
Section: Related Workmentioning
confidence: 99%
“…Jia et al designed an identity-based anonymous authentication key agreement protocol for the mobile edge computing (MEC) environment, the protocol implements mutual authentication in a single message exchange round and ensures user anonymity and untraceability, but they did not consider other security properties affected by changes in environmental factors [19,20]. Chen et al proposed a new three-party password-based authentication key exchange protocol to ensure the security of key exchange in wireless communication, their communication cost is acceptable but they used personal smart devices instead of arbitrary IoT devices for evaluation [21]. These methods basically use the idea of traditional authentication methods using cryptographic primitives for authentication in the IoT environment.…”
Section: Related Workmentioning
confidence: 99%
“…At present, with the rapid development of computer technology [2][3][4][5][6], intelligent computing is one of the important methods of intelligent science, and it is also a cutting-edge subject of information technology. The intelligent computing technologies and new methods developed in recent years have been widely used in many disciplines, and have achieved fruitful results in military, financial engineering, nonlinear system optimization, knowledge engineering, and computer-aided medical diagnosis.…”
Section: Introductionmentioning
confidence: 99%
“…. Optimization algorithms could be applied in a wide range of areas, like wireless sensor networks [18][19][20][21][22][23][24], transportation optimization issues [25], high-dimensional expensive problems [26] etc. The search range of the problem is arranged to be [−1,1].…”
Section: Introductionmentioning
confidence: 99%