DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, S | - |
dc.contributor.author | Kim, J | - |
dc.contributor.author | Hong, SJ | - |
dc.date.accessioned | 2016-04-01T03:00:57Z | - |
dc.date.available | 2016-04-01T03:00:57Z | - |
dc.date.created | 2009-08-23 | - |
dc.date.issued | 2009-07 | - |
dc.identifier.issn | 0164-1212 | - |
dc.identifier.other | 2009-OAK-0000020899 | - |
dc.identifier.uri | https://oasis.postech.ac.kr/handle/2014.oak/26136 | - |
dc.description.abstract | A fault-tolerant conference-key agreement protocol establishes a shared key among participants of a conference even when some malicious participants disrupt key agreement processes. Recently, Tseng proposed a new fault-tolerant conference-key agreement protocol that only requires a constant message size and a small number of rounds. In this paper, we show that the Tseng's protocol cannot provide forward and backward confidentiality during a conference session for the proposed attack method. We also show that a simple countermeasure-re-randomizing short-term keys of some participants-to avoid the proposed attack can be broken by extending the proposed attack method. (C) 2009 Elsevier Inc. All rights reserved. | - |
dc.description.statementofresponsibility | X | - |
dc.language | English | - |
dc.publisher | ELSEVIER SCIENCE INC | - |
dc.relation.isPartOf | JOURNAL OF SYSTEMS AND SOFTWARE | - |
dc.subject | Network-based conference | - |
dc.subject | Fault-tolerant key agreement | - |
dc.subject | Forward/backward confidentiality | - |
dc.subject | Security attack | - |
dc.subject | DISTRIBUTION-SYSTEM | - |
dc.subject | EXCHANGE | - |
dc.subject | SECRECY | - |
dc.title | Security weakness of Tseng's fault-tolerant conference-key agreement protocola | - |
dc.type | Article | - |
dc.contributor.college | 컴퓨터공학과 | - |
dc.identifier.doi | 10.1016/j.jss.2009.02.006 | - |
dc.author.google | Lee, S | - |
dc.author.google | Kim, J | - |
dc.author.google | Hong, SJ | - |
dc.relation.volume | 82 | - |
dc.relation.issue | 7 | - |
dc.relation.startpage | 1163 | - |
dc.relation.lastpage | 1167 | - |
dc.contributor.id | 10157751 | - |
dc.relation.journal | JOURNAL OF SYSTEMS AND SOFTWARE | - |
dc.relation.index | SCI급, SCOPUS 등재논문 | - |
dc.relation.sci | SCIE | - |
dc.collections.name | Journal Papers | - |
dc.type.rims | ART | - |
dc.identifier.bibliographicCitation | JOURNAL OF SYSTEMS AND SOFTWARE, v.82, no.7, pp.1163 - 1167 | - |
dc.identifier.wosid | 000268518800009 | - |
dc.date.tcdate | 2019-02-01 | - |
dc.citation.endPage | 1167 | - |
dc.citation.number | 7 | - |
dc.citation.startPage | 1163 | - |
dc.citation.title | JOURNAL OF SYSTEMS AND SOFTWARE | - |
dc.citation.volume | 82 | - |
dc.contributor.affiliatedAuthor | Kim, J | - |
dc.identifier.scopusid | 2-s2.0-67649379392 | - |
dc.description.journalClass | 1 | - |
dc.description.journalClass | 1 | - |
dc.description.wostc | 7 | - |
dc.type.docType | Article | - |
dc.subject.keywordPlus | DISTRIBUTION-SYSTEM | - |
dc.subject.keywordPlus | EXCHANGE | - |
dc.subject.keywordPlus | SECRECY | - |
dc.subject.keywordAuthor | Network-based conference | - |
dc.subject.keywordAuthor | Fault-tolerant key agreement | - |
dc.subject.keywordAuthor | Forward/backward confidentiality | - |
dc.subject.keywordAuthor | Security attack | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
library@postech.ac.kr Tel: 054-279-2548
Copyrights © by 2017 Pohang University of Science ad Technology All right reserved.