2013 International Conference on Computer Applications Technology (ICCAT) 2013
DOI: 10.1109/iccat.2013.6521972
|View full text |Cite
|
Sign up to set email alerts
|

Certificate-based authenticated key agreement protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…The key establishment between two communicating embedded plug-in devices using an unsecured channel is performed by applying the well known Diffie-Hellman (DH) key exchange protocol as a basis. However, this scheme does not authenticate the entities involved and thus suffers from man-in-the-middle attacks [12]. Therefore, a key agreement scheme as shown in figure 2 has been implemented such that the authentication is anchored on certificates.…”
Section: Key Establishmentmentioning
confidence: 99%
“…The key establishment between two communicating embedded plug-in devices using an unsecured channel is performed by applying the well known Diffie-Hellman (DH) key exchange protocol as a basis. However, this scheme does not authenticate the entities involved and thus suffers from man-in-the-middle attacks [12]. Therefore, a key agreement scheme as shown in figure 2 has been implemented such that the authentication is anchored on certificates.…”
Section: Key Establishmentmentioning
confidence: 99%
“…M. Nabil, Y. Abouelseoud, G. Elkobrosy and A. Abdelrazek [17] have proposed four authenticated KAPs that support explicit authentication. The authentication of the communicating parties is performed in a trusted third party like a firewall.…”
Section: Nabil Et Al's Protocolmentioning
confidence: 99%
“…Tripartite security mechanisms are of particular importance as they are useful in providing essential security in several vital applications such as in e-commerce where the three entities involved in the protocol are the merchant, the customer and the bank. Other interesting applications include a third party being added to chair or referee a conversation for the purpose of ad hoc auditing, data recovery or escrow purposes [5].…”
Section: Introductionmentioning
confidence: 99%