2022
DOI: 10.3390/sym14081567
|View full text |Cite
|
Sign up to set email alerts
|

Security Verification of Social Network Model Using Improved Three-Party Authenticated Key Exchange Protocol

Abstract: The proper verification of users plays a vital role during communication over a social network to protect the personal data of users. Multifarious protocols have been implemented to secure the confidential data of the users, but these protocols have various limitations and are incapable of providing secrecy of data against various attacks, such as replay and cryptanalysis attacks. In this article, the authors proposed a novel method for security verification of the social network model using an improved three-… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 33 publications
0
0
0
Order By: Relevance
“…At the same time, it controls all sorts of inference of activity track of use from the location server to keep it more secure. The work by Sinha et al [54] used elliptical curve encryption and symmetric encryption to resist replay attacks and cryptanalysis attacks in the social network. The investigation model has implemented a key exchange mechanism to carry out authentication.…”
Section: Authentication Approaches In Social Networkmentioning
confidence: 99%
“…At the same time, it controls all sorts of inference of activity track of use from the location server to keep it more secure. The work by Sinha et al [54] used elliptical curve encryption and symmetric encryption to resist replay attacks and cryptanalysis attacks in the social network. The investigation model has implemented a key exchange mechanism to carry out authentication.…”
Section: Authentication Approaches In Social Networkmentioning
confidence: 99%