Zhou (Eds.), Applied cryptography and network security (pp. Weaknesses of a password-authenticated key exchange protocol between clients with different passwords. New chaotic encryption algorithm based on chaotic sequence and plain text. In 2009 IEEE international conference on communications (pp. A chaotic maps-based key agreement protocol that preserves user anonymity. Parallel chaotic hash function based on the shuffle–exchange network. IEEE Transactions on Smart Grid, 4(1), 196–205. A decentralized security framework for data aggregation and access control in smart grids. A chaotic encryption scheme for real-time embedded systems: Design and implementation. Communications in Nonlinear Science and Numerical Simulation, 16(4), 1986–1992. An anonymous key agreement protocol based on chaotic maps. IEEE Transactions on Smart Grid, 4(1), 253–264.
GRID MAPPING PROTOCOL PASSWORD
Multilayer consensus ECC-based password authenticated key-exchange (MCEPAK) protocol for smart grid system. The PAK suite: Protocols for password-authenticated key exchange. An improved secure and efficient password and chaos-based two-party key agreement protocol. Chaotic hash function based on the dynamic S-Box with variable parameters. In International conference on security and privacy in communication systems. Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings. In 2010 1st IEEE international conference on smart grid communications (SmartGridComm) (pp. Secure information aggregation for smart grids using homomorphic encryption. An extended chaotic maps-based key agreement protocol with user anonymity. Enhancing the security of password authenticated key agreement protocols based on chaotic maps. IEEE Circuits and Systems Magazine, 1(3), 6–21. Chaos-based cryptography: A brief overview. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 85(10), 2229–2237. Pretty-simple password-authenticated key-exchange protocol proven to be secure in the standard model. Efficient and secure authenticated key exchange using weak passwords. Berlin: Springer Science & Business Media. A structure-based chaotic hashing scheme. Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy. Jiang, Q., Wei, F., Fu, S., Ma, J., Li, G., & Alelaiwi, A. International Journal of Electronic Security and Digital Forensics, 5(3–4), 172–177. Cryptanalysis of a key agreement protocol based on chaotic hash. Chaotic map based key agreement with/out clock synchronization. Security of a key agreement protocol based on chaotic maps. Secure group key agreement protocol based on chaotic hash. A secure chaotic maps-based key agreement protocol without using smart cards. In 2011 IEEE conference on computer communications workshops (INFOCOM WKSHPS) (pp. Towards a light-weight message authentication mechanism tailored for smart grid communications. IEEE Transactions on Information Theory, 22(6), 644–654.įouda, M. Security and Communication Networks, 6(1), 108–114.ĭiffie, W., & Hellman, M. A security-enhanced key agreement protocol based on chaotic maps. In International workshop on public key cryptography (pp. New security results on encrypted key exchange. ACM.īresson, E., Chevassut, O., & Pointcheval, D. In Proceedings of the 10th ACM conference on computer and communications security (pp. Security proofs for an efficient password-based key exchange. In Proceedings of the 1st ACM conference on computer and communications security (pp. Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise. In 1992 IEEE computer society symposium on research in security and privacy, 1992. Encrypted key exchange: Password-based protocols secure against dictionary attacks. In Advances in cryptology, Eurocrypt 2000 (pp. Authenticated key exchange secure against dictionary attacks. rep., Citeseer.īellare, M., Pointcheval, D., & Rogaway, P. The AuthA protocol for password-based authenticated key exchange.
GRID MAPPING PROTOCOL VERIFICATION
In International conference on computer aided verification (pp. The AVISPA tool for the automated validation of internet security protocols and applications. Chaos, Solitons and Fractals, 26(1), 7–11.Īrmando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuéllar, J., et al. Security problems with a chaos-based deniable authentication scheme. Simple password-based encrypted key exchange protocols.