Common Contracts

1 similar Authenticated and Key Agreement contracts

Secure Authenticated and Key Agreement Protocols With Access Control for Mobile Environments
Authenticated and Key Agreement • October 23rd, 2009

Abstract The increasing development and progress in wireless mobile communications has attracted an important amount of at- tention on the security, anonymity and privacy issues. To provide secure communications over un-trusted network, authenticated key agreement protocols are crucial primitive by establishing secure session keys. Achieving secure communications between communicating entities is an important issue for mobile envi- ronment. Anonymous authentication is a means of authorizing a user without revealing his/her identi cation. Mobile technologies such PDAs and mobile phone systems are increasingly being deployed in pervasive computing. These mobile devices have raised public concern regarding violation of privacy, anonymity and information con dentiality. Considering these concerns, there is a growing need to discover and develop techniques and methods to overcome the threats described above. In this paper we propose several protocols which enhance the authentication, securi

AutoNDA by SimpleDocs
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!