2009
DOI: 10.1007/s11277-009-9788-y
|View full text |Cite
|
Sign up to set email alerts
|

Authentication and ID-Based Key Management Protocol in Pervasive Environment

Abstract: The combination of wired and wireless technologies is spreading rapidly with the advance of Internet and networks, since it enables the creation of new services, and provides new features to both users and service providers. In such wired and wireless integrated services, network integration is very important, because such systems involve linking heterogeneous networks; and they involve integrating transmission technologies across networks. In this situation, existing security and communication technologies ar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…Each model has been evaluated based on the common security properties required [3]. The SSP is in fact similar to authentication [17,20] and key establishment (AKE) [18] protocols, and therefore we consider the following basic security properties required of such protocols [15]. ವ Known key security (KKS) [15]: Compromising a session key does not leak out other session keys.…”
Section: Related Workmentioning
confidence: 99%
“…Each model has been evaluated based on the common security properties required [3]. The SSP is in fact similar to authentication [17,20] and key establishment (AKE) [18] protocols, and therefore we consider the following basic security properties required of such protocols [15]. ವ Known key security (KKS) [15]: Compromising a session key does not leak out other session keys.…”
Section: Related Workmentioning
confidence: 99%
“…The SSP is in fact similar to authentication [23,29] and key establishment (AKE) [24] protocols, and therefore we consider the following basic security properties required of such protocols [20].…”
mentioning
confidence: 99%