scholarly journals A Novel ID-Based Authentication and Key Exchange Protocol Resistant to Ephemeral-Secret-Leakage Attacks for Mobile Devices

2015 ◽  
Vol 11 (5) ◽  
pp. 898716 ◽  
Author(s):  
Yuh-Min Tseng ◽  
Sen-Shan Huang ◽  
Tung-Tso Tsai ◽  
Li Tseng
2020 ◽  
Vol 14 (3) ◽  
pp. 38-49
Author(s):  
Pranav Vyas ◽  
Bhushan Trivedi

In this article, the authors discuss their experiment of simulating a proposed key exchange protocol by implementing it in a sample e-commerce application on a mobile device. The article compares its performance with other protocols. The authors also implemented similar industry standard key exchange protocols among other similar protocols proposed by other researchers for comparison. The authors consider different parameters such as number of operations required for key exchange, key exchange time and battery usage. The authors also consider different network bandwidth and mobile devices in their experiment.


2006 ◽  
Vol 1 (2) ◽  
pp. 52-70
Author(s):  
Mohammed A. Tawfiq ◽  
◽  
Sufyan T. Faraj Al-janabi ◽  
Abdul-Karim A. R. Kadhim ◽  
◽  
...  

2010 ◽  
Vol 30 (7) ◽  
pp. 1805-1808
Author(s):  
Shao-feng DENG ◽  
Fan DENG ◽  
Yi-fa LI

2020 ◽  
Vol 9 (12) ◽  
pp. 11169-11177
Author(s):  
A. J. Meshram ◽  
C. Meshram ◽  
S. D. Bagde ◽  
R. R. Meshram

Sign in / Sign up

Export Citation Format

Share Document