{"title":"一种新的无线移动网络认证密钥协议","authors":"Shin-Jia Hwang, M. Chai","doi":"10.1109/IAS.2009.58","DOIUrl":null,"url":null,"abstract":"For secure communications over wireless mobile networks, Lu et al proposed their secure authentication key agreement protocol. However, Lu et al’s protocol is vulnerable against Chang and Chang’s parallel guessing attack. To remove the parallel guessing attacks, Chang and Chang also proposed their improvement. However, Chang and Chang’s protocol is still vulnerable against their parallel guessing attack. So our new authenticated key agreement protocol for wireless mobile networks is proposed.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A New Authenticated Key Agreement Protocol for Wireless Mobile Networks\",\"authors\":\"Shin-Jia Hwang, M. Chai\",\"doi\":\"10.1109/IAS.2009.58\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"For secure communications over wireless mobile networks, Lu et al proposed their secure authentication key agreement protocol. However, Lu et al’s protocol is vulnerable against Chang and Chang’s parallel guessing attack. To remove the parallel guessing attacks, Chang and Chang also proposed their improvement. However, Chang and Chang’s protocol is still vulnerable against their parallel guessing attack. So our new authenticated key agreement protocol for wireless mobile networks is proposed.\",\"PeriodicalId\":240354,\"journal\":{\"name\":\"2009 Fifth International Conference on Information Assurance and Security\",\"volume\":\"10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-08-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 Fifth International Conference on Information Assurance and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IAS.2009.58\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Fifth International Conference on Information Assurance and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IAS.2009.58","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A New Authenticated Key Agreement Protocol for Wireless Mobile Networks
For secure communications over wireless mobile networks, Lu et al proposed their secure authentication key agreement protocol. However, Lu et al’s protocol is vulnerable against Chang and Chang’s parallel guessing attack. To remove the parallel guessing attacks, Chang and Chang also proposed their improvement. However, Chang and Chang’s protocol is still vulnerable against their parallel guessing attack. So our new authenticated key agreement protocol for wireless mobile networks is proposed.