2018 International Conference on Electronics, Information, and Communication (ICEIC) 2018
DOI: 10.23919/elinfocom.2018.8330686
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis and improvement of an efficient two-party authentication key exchange protocol for mobile environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 3 publications
0
5
0
Order By: Relevance
“…Note that each result is the average of 100 tests. As shown in Figure 3, the time cost of our protocol is larger than the protocols proposed by Tarun et al [24], Alamr et al [28], Shen et al [13], and Park et al [14], but significantly less than the protocols proposed by Butun et al [17] and Rathore et al [22]. Considering the security of our protocol, the computation cost of key agreement is acceptable for many smart home systems.…”
Section: Methodsmentioning
confidence: 76%
See 4 more Smart Citations
“…Note that each result is the average of 100 tests. As shown in Figure 3, the time cost of our protocol is larger than the protocols proposed by Tarun et al [24], Alamr et al [28], Shen et al [13], and Park et al [14], but significantly less than the protocols proposed by Butun et al [17] and Rathore et al [22]. Considering the security of our protocol, the computation cost of key agreement is acceptable for many smart home systems.…”
Section: Methodsmentioning
confidence: 76%
“…The average time cost for 100 tests is shown in Figure 4. With the increase in data size, the time consumption of our protocol is much lower than Butun's protocol [14]. This experiment showed that our lightweight protocol can work in the smart home environment better than Butun's protocol.…”
Section: Methodsmentioning
confidence: 82%
See 3 more Smart Citations