Department of Information Technology, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, KSA
Department of Information Technology, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, KSA
Department of Information Technology, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, KSA
Department of Information Systems, Information Security Research Group, Faculty of Computing and
Information Technology, King Abdulaziz University, Jeddah, KSA
Copyright © 2015 Areej Omar Baalghusun, Olfa Fahad Abusalem, Zahra Abbas Al Abbas, Jayaprakash Kar et al. This is
an open access article distributed under the Creative Commons Attribution
License, which permits unrestricted use, distribution, and reproduction in any
medium, provided the original work is properly cited.
How to Cite this Article
Baalghusun, A. , Abusalem, O. , Abbas, Z. and Kar, J. (2015) Authenticated Key Agreement Protocols: A Comparative Study.
Journal of Information Security,
6, 51-58. doi:
10.4236/jis.2015.61006.