... Wireless Systems,Barcelona, Spain, May 2010.[20] I. Askoxylakis, K. Markantonakis, T. Tryfonas, J. May, and A. Traganitis, A face centered cubic key agreement mechanism for mobile ad hoc networks,” ... authentication mecha-nism. A simple approach of a password-based authentication scheme could be the use of sufficiently large and randomlygenerated data strings employed as passwords. In such a scheme, ... following: there aretwo parties A, B that share a password P.Bothpartiesuse a suitable symmetric cryptosystem but entity A has also theability to create a random asymmetric key pair, (e A , d A ).During...