Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 479534, 7 pages
http://dx.doi.org/10.1155/2014/479534
Research Article

On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys

1Department of Computer Engineering, Konkuk University, 268 Chungwondaero, Chungju, Chungcheongbuk-do 380-701, Republic of Korea
2Information Assurance Research Group, Advanced Computing Research Centre, University of South Australia, Mawson Lakes, SA 5095, Australia
3Department of Computer Engineering, Sungkyunkwan University, 2066 Seobu-ro, Suwon, Gyeonggi-do 440-746, Republic of Korea

Received 19 June 2014; Accepted 16 July 2014; Published 1 September 2014

Academic Editor: Moonseong Kim

Copyright © 2014 Junghyun Nam et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [6 citations]

The following is the list of published articles that have cited the current article.

  • Youngsook Lee, and Juryon Paik, “Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services,” The Scientific World Journal, vol. 2014, pp. 1–8, 2014. View at Publisher · View at Google Scholar
  • Junghyun Nam, Kim-Kwang Raymond Choo, Juryon Paik, and Dongho Won, “Password-Only Authenticated Three-Party Key Exchange Proven Secure against Insider Dictionary Attacks,” The Scientific World Journal, vol. 2014, pp. 1–15, 2014. View at Publisher · View at Google Scholar
  • Minsu Park, Hyunsung Kim, Sung-Woon Lee, Minsu Park, Hyunsung Kim, and Sung-Woon Lee, “Privacy preserving biometric-based user authentication protocol using smart cards,” Proceedings - 17th IEEE International Conference on Computational Science and Engineering, CSE 2014, Jointly with 13th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2014, 13th International Symposium on Pervasive Systems, Algorithms, and Networks, I-SPAN 2014 and 8th International Conference on Frontier of Computer Science and Technology, FCST 2014, pp. 1541–1544, 2015. View at Publisher · View at Google Scholar
  • Donghoon Lee, Youngsook Lee, Dongho Won, Jiye Kim, and Younsung Choi, “Security improvement of portable key management using a mobile phone,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 9158, pp. 148–159, 2015. View at Publisher · View at Google Scholar
  • Junghyun Nam, Kim-Kwang Raymond Choo, Sangchul Han, Dongho Won, and Juryon Paik, “Two-round password-only authenticated key exchange in the three-party setting,” Symmetry, vol. 7, no. 1, pp. 105–124, 2015. View at Publisher · View at Google Scholar
  • Younsung Choi, Youngsook Lee, and Dongho Won, “Security Improvement on Biometric Based Authentication Scheme for Wireless Sensor Networks Using Fuzzy Extraction,” International Journal of Distributed Sensor Networks, vol. 2016, pp. 1–16, 2016. View at Publisher · View at Google Scholar