Scheduled System Maintenance:
On May 6th, system maintenance will take place from 8:00 AM - 12:00 PM ET (12:00 - 16:00 UTC). During this time, there may be intermittent impact on performance. We apologize for the inconvenience.
By Topic

A secure verifiable key agreement protocol for mobile conferencing

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

The purchase and pricing options are temporarily unavailable. Please try again later.
3 Author(s)
Saha, M. ; Dept. of CSE., IIT Kharagpur, Kharagpur ; Roychowdhury, D. ; Sengupta, I.

A growing application area in wireless communications is mobile teleconference. However, wireless communication are more susceptible to eavesdropping and unauthorized access than the wired communication. It is therefore crucial to build secure conference scheme for such communication. In this work, propose a true conference key agreement scheme which addresses some security issues not considered in previous works on conference key schemes. In the proposed protocol, the users can verify the utilization of their share in key construction. Also, the scheme is forward secure, provides mutual authentication and secure dynamic joining and leaving. The protocol is shown to be resistant against replay and impersonation attacks.

Published in:

Communication Systems Software and Middleware and Workshops, 2008. COMSWARE 2008. 3rd International Conference on

Date of Conference:

6-10 Jan. 2008