Sanjay Kumar Sonkar et al ,Int.J.<strong>Computer</strong> <strong>Technology</strong> & Applications,Vol 3 (2), 525-531 Symposium on Programming (ESOP), pages 157– 171, 2005. [14] Anupam Datta, Ante Derek, John Mitchell, Vitalij Shmatikov, <strong>and</strong> Matthieu Turuani. Probabilistic polynomial-time semantics for protocol security logic. In Proc. 32nd <strong>International</strong> Colloquium on Automata, Languages <strong>and</strong> Programming (ICALP), volume 3580 <strong>of</strong> Lecture Notes in <strong>Computer</strong> Science, pages 16–29. Springer, 2005. [15] Laud, P. Formal analysis <strong>of</strong> crypto protocols: Secrecy types for a simulatable cryptographic library. In Proc. ACM Conf. on <strong>Computer</strong> <strong>and</strong> Communication Security (ACM CCS 2005) (2005), ACM Press, pp. 26–35. http://scialert.net/fulltext/?doi=itj.2011.1068.1091 &org=11 [16] C. He <strong>and</strong> J. C. Mitchell. Security Analysis <strong>and</strong> Improvements for IEEE 802.11i. In Proceedings <strong>of</strong> the 11th Annual Network <strong>and</strong> Distributed System Security Symposium (NDSS ’05), February 2005. [17] Ran Canetti <strong>and</strong> Jonathan Herzog. Universally composable symbolic analysis <strong>of</strong> cryptographic protocols (the case <strong>of</strong> encryption-based mutual authentication <strong>and</strong> key exchange). In Proc. 3rd Theory <strong>of</strong> Cryptography Conference (TCC), 2006. [18] Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay, <strong>and</strong> Chris Walstad. Breaking <strong>and</strong> fixing public-key Kerberos. In Proc. WITS’06, pages 55–70, 2006. [19] Anupam Datta, Ante Derek, John Mitchell, <strong>and</strong> Bogdan Warinschi. Key exchange protocols: Security definition, pro<strong>of</strong> method, <strong>and</strong> applications. In 19th IEEE <strong>Computer</strong> Security Foundations Workshop (CSFW 19), Venice, Italy, 2006. IEEE Press. [20] Tsudik, G. YA-TRAP: Yet another trivial RFID authentication protocol. In Proc. IEEE Intern. Conf. on Pervasive Computing <strong>and</strong> Communications (PerCom 2006) (2006), IEEE Press. [21] Oren, Y., <strong>and</strong> Shamir, A. Power analysis <strong>of</strong> RFID tags. Appeared in the rump session <strong>of</strong> Advances in Cryptology, CRYPTO 2006. Available online at http://www.wisdom.weizmann.ac.il/_yossio/rfid/, Weizmann Institute, 2006. [22] Burmester, M., van Le, T., <strong>and</strong> de Medeiros, B. Provably secure ubiquitous systems: Universally composable RFID authentication protocols. E-print report 2006/131, <strong>International</strong> Association for Cryptological Research, 2006. [23] IETF. Public Key Cryptography for Initial Authentication in Kerberos, 1996–2006. Sequence <strong>of</strong> Internet drafts available from http://tools.ietf.org/wg/krb-wg/draft-ietf-catkerberos-pk-init/. [24] F. Wang <strong>and</strong> Y. Zhang, “A new provably secure authentication <strong>and</strong> key agreement mechanism for SIP using certificateless public-key cryptography”, Cryptology ePrint Archive, Report 2007/220, 2007. [25] Tarjei K. M<strong>and</strong>t <strong>and</strong> Chik How Tan, “Certificateless authenticated two-party key agreement protocol”, ASIAN 2006, LNCS 4435, pp.37-44, 2007. [26] Y. Sun, F. Zhang, <strong>and</strong> J. Baek, “Strongly Secure Certificate less Public Key Encryption without Pairing”, CANS 2007, LNCS 4856, pp.194-208, 2007. [27] X. Liang, SH. Wang, J. Shen <strong>and</strong> G. Xu, “Breaking <strong>and</strong> Repairing the Certificate less key agreement protocol from ASIAN 2006”, Wuhan University <strong>Journal</strong> <strong>of</strong> Natural Sciences,vol. 13, no. 5, pp. 562- 566, 2008. [28] Dario Fiore <strong>and</strong> Rosario Gennaro, “Making the Diffie-Hellman Protocol Identity-Based”, http://eprint.iacr.org/2009/174,2009. [29] Georg Lippold, Colin Boyd <strong>and</strong> Juan Gonzalez Nieto, “Strongly Secure Certificate less Key Agreement”, http://eprint.iacr.org/2009/219. [30] Cas J.F. Cremers, “Formally <strong>and</strong> Practically Relating the CK, CK-HMQV, <strong>and</strong> eCK Security Models for Authenticated Key Exchange”, http://eprint.iacr.org/2009/253. Bibliographies: ISSN:2229-6093 Sanjay Kumar Sonkar was born at Varanasi, (U.P.), in India. He received the B. Tech degree in <strong>Computer</strong> Science & Engineering in 2010 from Radha Govind Engineering College, Meerut, India. Presently, he is an M.Tech student in <strong>Computer</strong> Science & Engineering from Kamla Nehru Institute <strong>of</strong> <strong>Technology</strong>, Sultanpur, U.P., India. Dharmendra Lal Gupta is currently working as an Assistant Pr<strong>of</strong>essor in the Department <strong>of</strong> <strong>Computer</strong> Science & Engineering at KNIT, Sultanpur (U.P.) India. And he is also pursuing his Ph.D. in <strong>Computer</strong> Science & Engineering from Mewar University, Chittorgarh (Rajasthan). He received B.Tech.(1999) from Kamla Nehru Institute <strong>of</strong> <strong>Technology</strong> (KNIT) Sultanpur, in <strong>Computer</strong> Science & Engineering, M.Tech. Hon’s (2003) in Digital Electronics <strong>and</strong> Systems from Kamla Nehru Institute <strong>of</strong> <strong>Technology</strong> (KNIT) Sultanpur. His research interests are Cryptography <strong>and</strong> Network Security, S<strong>of</strong>tware Quality Engineering, <strong>and</strong> S<strong>of</strong>tware Engineering. Dr. Anil Kumar Malviya is an Associate Pr<strong>of</strong>essor in the <strong>Computer</strong> Science & Engineeering. Department at Kamla Nehru Institute <strong>of</strong> <strong>Technology</strong>, (KNIT), Sultanpur. He received his B.Sc. & M.Sc. both in <strong>Computer</strong> Science from Banaras Hindu University, Varanasi respectively in 1991 <strong>and</strong> 1993 <strong>and</strong> Ph.D. degree in <strong>Computer</strong> Science from 530
Sanjay Kumar Sonkar et al ,Int.J.<strong>Computer</strong> <strong>Technology</strong> & Applications,Vol 3 (2), 525-531 Dr. B.R. Ambedkar University; Agra in 2006.He is Life Member <strong>of</strong> CSI, India. He has published about 31papers in <strong>International</strong>/National <strong>Journal</strong>s, conferences <strong>and</strong> seminars. His research interests are Data mining, S<strong>of</strong>tware Engineering, Cryptography & Network Security. ISSN:2229-6093 Ganesh Ch<strong>and</strong>ra was born at Kanpur, India. He received the B. Tech. Degree in <strong>Computer</strong> Science <strong>and</strong> Engineering in 2009 from Dr. Ambedkar Institute <strong>of</strong> <strong>Technology</strong> for H<strong>and</strong>icapped, Kanpur, India. He is currently pursuing M. Tech in <strong>Computer</strong> Science <strong>and</strong> Engineering from Kamla Nehru Institute <strong>of</strong> <strong>Technology</strong>, Sultanpur, U.P, India. Vinod Kumar Yadav was born in Jaunpur, India. He received the B.Tech. Degree in <strong>Computer</strong> Science <strong>and</strong> Information <strong>Technology</strong> in 2008 from I.E.T., M.J.P. Rohilkh<strong>and</strong> University Bareilly, India. He is currently pursuing M.Tech in <strong>Computer</strong> Science <strong>and</strong> Engineering from Kamla Nehru Institute <strong>of</strong> <strong>Technology</strong>, Sultanpur, U.P., India. 531