Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014 (2014), Article ID 479534, 7 pages
http://dx.doi.org/10.1155/2014/479534
Research Article

On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys

1Department of Computer Engineering, Konkuk University, 268 Chungwondaero, Chungju, Chungcheongbuk-do 380-701, Republic of Korea
2Information Assurance Research Group, Advanced Computing Research Centre, University of South Australia, Mawson Lakes, SA 5095, Australia
3Department of Computer Engineering, Sungkyunkwan University, 2066 Seobu-ro, Suwon, Gyeonggi-do 440-746, Republic of Korea

Received 19 June 2014; Accepted 16 July 2014; Published 1 September 2014

Academic Editor: Moonseong Kim

Copyright © 2014 Junghyun Nam et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [4 citations]

The following is the list of published articles that have cited the current article.

  • Youngsook Lee, and Juryon Paik, “Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services,” The Scientific World Journal, vol. 2014, pp. 1–8, 2014. View at Publisher · View at Google Scholar
  • Junghyun Nam, Kim-Kwang Raymond Choo, Juryon Paik, and Dongho Won, “Password-Only Authenticated Three-Party Key Exchange Proven Secure against Insider Dictionary Attacks,” The Scientific World Journal, vol. 2014, pp. 1–15, 2014. View at Publisher · View at Google Scholar
  • Junghyun Nam, Kim-Kwang Raymond Choo, Sangchul Han, Dongho Won, and Juryon Paik, “Two-round password-only authenticated key exchange in the three-party setting,” Symmetry, vol. 7, no. 1, pp. 105–124, 2015. View at Publisher · View at Google Scholar
  • Younsung Choi, Youngsook Lee, and Dongho Won, “Security Improvement on Biometric Based Authentication Scheme for Wireless Sensor Networks Using Fuzzy Extraction,” International Journal of Distributed Sensor Networks, vol. 2016, pp. 1–16, 2016. View at Publisher · View at Google Scholar