232
Views
9
CrossRef citations to date
0
Altmetric
Articles

An Efficient 3D Elliptic Curve Diffie–Hellman (ECDH) Based Two-Server Password-Only Authenticated Key Exchange Protocol with Provable Security

, &

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (1)

K. Anitha Kumari, T. P. Kamatchi, R. Senthil Prabha & Bharath K. Samanthula. (2023) Hyperelliptic Curve Diffie–Hellman-Based Two-Server Password-Only Authenticated Key Exchange Protocol for Edge Computing Systems. IETE Journal of Research 69:7, pages 4311-4322.
Read now

Articles from other publishers (8)

Kübra Seyhan & Sedat Akleylek. (2023) A new password-authenticated module learning with rounding-based key exchange protocol: Saber.PAKE. The Journal of Supercomputing.
Crossref
Ajay Kakkar & Maninder Singh. (2023) Performance Analysis of a Lightweight Robust Chaotic Image Re-encryption Scheme for 5G Heterogeneous Networks. Wireless Personal Communications 129:4, pages 2607-2631.
Crossref
Ajay Kakkar. (2020) A survey on secure communication techniques for 5G wireless heterogeneous networks. Information Fusion 62, pages 89-109.
Crossref
Hui Zhang, Saru Kumari, Mohammad S. Obaidat & Fushan S. Wei. (2020) Gateway‐oriented two‐server password authenticated key exchange protocol for unmanned aerial vehicles in mobile edge computing. IET Communications 14:15, pages 2427-2433.
Crossref
K. Anitha Kumari, R. Padmashani, R. Varsha & Vasu Upadhayay. 2020. Principles of Internet of Things (IoT) Ecosystem: Insight Paradigm. Principles of Internet of Things (IoT) Ecosystem: Insight Paradigm 305 326 .
K. Anitha Kumari & G. Sudha Sadasivam. (2018) Two-Server 3D ElGamal Diffie-Hellman Password Authenticated and Key Exchange Protocol Using Geometrical Properties. Mobile Networks and Applications 24:3, pages 1104-1119.
Crossref
Munmun Saha, Sanjaya Kumar Panda & Suvasini Panigrahi. 2019. Cyber Security in Parallel and Distributed Computing. Cyber Security in Parallel and Distributed Computing 129 138 .
Nissa Mehibel & M'hamed Hamadouche. (2017) A New Algorithm for a Public Key Cryptosystem Using Elliptic Curve. A New Algorithm for a Public Key Cryptosystem Using Elliptic Curve.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.