In 1998, Chang and Wu proposed a group-oriented authentication mechanism with key exchange [Computer Communications21 (1998) 485-497]. The authors show that the Chang-Wu protocols are vulnerable to the impersonation attack. They also give improvements that can not only eliminate the security flaw, but also reduce the redundant messages inherent in the original protocols.
All Science Journal Classification (ASJC) codes
- Theoretical Computer Science
- Signal Processing
- Information Systems
- Computer Science Applications