View : 553 Download: 0

Full metadata record

DC Field Value Language
dc.contributor.author심경아-
dc.date.accessioned2016-08-28T11:08:06Z-
dc.date.available2016-08-28T11:08:06Z-
dc.date.issued2006-
dc.identifier.issn0916-8532-
dc.identifier.otherOAK-3430-
dc.identifier.urihttps://dspace.ewha.ac.kr/handle/2015.oak/219724-
dc.description.abstractHirose and Yoshida proposed an authenticated key agreement protocol based on the intractability of the Computational Diffie-Hellman problem. Recently, Hirose and Matsuura pointed out that Hirose and Yoshida's protocol is vulnerable to Denial-of-Service (DoS) attacks. And they proposed two key agreement protocols which are resistant to the DoS attacks. Their protocols are the first authenticated key agreement protocols resistant to both the storage exhaustion attack and the CPU exhaustion attack. In this paper we show that Hirose and Matsuura's DoS-resistant key agreement protocols and Hirose and Yoshida's key agreement protocol are vulnerable to impersonation attacks. We make suggestions for improvements. Copyright © 2006 The Institute of Electronics, Information and Communication Engineers.-
dc.languageEnglish-
dc.titleImpersonation attacks on key agreement protocols resistant to denial of service attacks-
dc.typeConference Paper-
dc.relation.issue7-
dc.relation.volumeE89-D-
dc.relation.indexSCIE-
dc.relation.indexSCOPUS-
dc.relation.startpage2306-
dc.relation.lastpage2309-
dc.relation.journaltitleIEICE Transactions on Information and Systems-
dc.identifier.doi10.1093/ietisy/e89-d.7.2306-
dc.identifier.wosidWOS:000238961900041-
dc.identifier.scopusid2-s2.0-33747884659-
dc.author.googleShim K.-A.-
dc.date.modifydate20200911081002-
Appears in Collections:
자연과학대학 > 수학전공 > Journal papers
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

BROWSE