GLORIA

GEOMAR Library Ocean Research Information Access

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Association for Computing Machinery (ACM)  (2)
  • Kim, Woo-Hun  (2)
Material
Publisher
  • Association for Computing Machinery (ACM)  (2)
Person/Organisation
Language
Years
  • 1
    Online Resource
    Online Resource
    Association for Computing Machinery (ACM) ; 2003
    In:  ACM SIGOPS Operating Systems Review Vol. 37, No. 2 ( 2003-04), p. 13-18
    In: ACM SIGOPS Operating Systems Review, Association for Computing Machinery (ACM), Vol. 37, No. 2 ( 2003-04), p. 13-18
    Abstract: Recently, Yeh and Sun proposed a simple authenticated key agreement protocol resistant to password guessing attacks called SAKA that is simple and cost-effective. And they provided a formal proof of security to show its strength against both passive and active adversaries. Compared with the previous well-known protocols, SAKA has less number of steps and less computation cost. However, considering the total execution time, SAKA is not the most efficient method, since it does not provide parties with parallel computation. In this paper, we present parallelizable simple authenticated key agreement protocol for improving the efficiency of the SAKA while maintaining provable security.
    Type of Medium: Online Resource
    ISSN: 0163-5980
    RVK:
    Language: English
    Publisher: Association for Computing Machinery (ACM)
    Publication Date: 2003
    detail.hit.zdb_id: 2082220-0
    detail.hit.zdb_id: 243805-7
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Association for Computing Machinery (ACM) ; 2003
    In:  ACM SIGOPS Operating Systems Review Vol. 37, No. 3 ( 2003-07), p. 17-22
    In: ACM SIGOPS Operating Systems Review, Association for Computing Machinery (ACM), Vol. 37, No. 3 ( 2003-07), p. 17-22
    Abstract: Recently, Yeh and Sun proposed a simple authenticated key agreement protocol resistant to password guessing attacks called SAKA that is simple and cost-effective. And they provided a formal proof of security to show its strength against both passive and active adversaries. Compared with the previous well-known protocols, SAKA has less number of steps and less computation cost. However, considering the total execution time, SAKA is not the most efficient method, since it does not provide parties with parallel computation. In this paper, we present parallelizable simple authenticated key agreement protocol for improving the efficiency of the SAKA while maintaining provable security.
    Type of Medium: Online Resource
    ISSN: 0163-5980
    RVK:
    Language: English
    Publisher: Association for Computing Machinery (ACM)
    Publication Date: 2003
    detail.hit.zdb_id: 2082220-0
    detail.hit.zdb_id: 243805-7
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...