Journal of Information Security

Vol.6 No.1(2015), Paper ID 53160, 8 pages

DOI:10.4236/jis.2015.61006

 

Authenticated Key Agreement Protocols: A Comparative Study

 

Areej Omar Baalghusun, Olfa Fahad Abusalem, Zahra Abbas Al Abbas, Jayaprakash Kar

 

Department of Information Technology, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, KSA
Department of Information Technology, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, KSA
Department of Information Technology, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, KSA
Department of Information Systems, Information Security Research Group, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, KSA

 

Copyright © 2015 Areej Omar Baalghusun, Olfa Fahad Abusalem, Zahra Abbas Al Abbas, Jayaprakash Kar et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

 

How to Cite this Article


Baalghusun, A. , Abusalem, O. , Abbas, Z. and Kar, J. (2015) Authenticated Key Agreement Protocols: A Comparative Study. Journal of Information Security, 6, 51-58. doi: 10.4236/jis.2015.61006.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.