Open Access System for Information Sharing

Login Library

 

Article
Cited 10 time in webofscience Cited 11 time in scopus
Metadata Downloads
Full metadata record
Files in This Item:
There are no files associated with this item.
DC FieldValueLanguage
dc.contributor.authorLee, S-
dc.contributor.authorKim, J-
dc.contributor.authorHong, SJ-
dc.date.accessioned2016-04-01T03:00:57Z-
dc.date.available2016-04-01T03:00:57Z-
dc.date.created2009-08-23-
dc.date.issued2009-07-
dc.identifier.issn0164-1212-
dc.identifier.other2009-OAK-0000020899-
dc.identifier.urihttps://oasis.postech.ac.kr/handle/2014.oak/26136-
dc.description.abstractA fault-tolerant conference-key agreement protocol establishes a shared key among participants of a conference even when some malicious participants disrupt key agreement processes. Recently, Tseng proposed a new fault-tolerant conference-key agreement protocol that only requires a constant message size and a small number of rounds. In this paper, we show that the Tseng's protocol cannot provide forward and backward confidentiality during a conference session for the proposed attack method. We also show that a simple countermeasure-re-randomizing short-term keys of some participants-to avoid the proposed attack can be broken by extending the proposed attack method. (C) 2009 Elsevier Inc. All rights reserved.-
dc.description.statementofresponsibilityX-
dc.languageEnglish-
dc.publisherELSEVIER SCIENCE INC-
dc.relation.isPartOfJOURNAL OF SYSTEMS AND SOFTWARE-
dc.subjectNetwork-based conference-
dc.subjectFault-tolerant key agreement-
dc.subjectForward/backward confidentiality-
dc.subjectSecurity attack-
dc.subjectDISTRIBUTION-SYSTEM-
dc.subjectEXCHANGE-
dc.subjectSECRECY-
dc.titleSecurity weakness of Tseng's fault-tolerant conference-key agreement protocola-
dc.typeArticle-
dc.contributor.college컴퓨터공학과-
dc.identifier.doi10.1016/j.jss.2009.02.006-
dc.author.googleLee, S-
dc.author.googleKim, J-
dc.author.googleHong, SJ-
dc.relation.volume82-
dc.relation.issue7-
dc.relation.startpage1163-
dc.relation.lastpage1167-
dc.contributor.id10157751-
dc.relation.journalJOURNAL OF SYSTEMS AND SOFTWARE-
dc.relation.indexSCI급, SCOPUS 등재논문-
dc.relation.sciSCIE-
dc.collections.nameJournal Papers-
dc.type.rimsART-
dc.identifier.bibliographicCitationJOURNAL OF SYSTEMS AND SOFTWARE, v.82, no.7, pp.1163 - 1167-
dc.identifier.wosid000268518800009-
dc.date.tcdate2019-02-01-
dc.citation.endPage1167-
dc.citation.number7-
dc.citation.startPage1163-
dc.citation.titleJOURNAL OF SYSTEMS AND SOFTWARE-
dc.citation.volume82-
dc.contributor.affiliatedAuthorKim, J-
dc.identifier.scopusid2-s2.0-67649379392-
dc.description.journalClass1-
dc.description.journalClass1-
dc.description.wostc7-
dc.type.docTypeArticle-
dc.subject.keywordPlusDISTRIBUTION-SYSTEM-
dc.subject.keywordPlusEXCHANGE-
dc.subject.keywordPlusSECRECY-
dc.subject.keywordAuthorNetwork-based conference-
dc.subject.keywordAuthorFault-tolerant key agreement-
dc.subject.keywordAuthorForward/backward confidentiality-
dc.subject.keywordAuthorSecurity attack-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-

qr_code

  • mendeley

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher

김종KIM, JONG
Dept of Computer Science & Enginrg
Read more

Views & Downloads

Browse