共 50 条
- [31] Comments on Physically Unclonable Function Based Two-Factor Authentication Protocols Wireless Personal Communications, 2019, 106 : 1243 - 1252
- [32] A Study of Two-Party Certificateless Authenticated Key-Agreement Protocols PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009, PROCEEDINGS, 2009, 5922 : 57 - +
- [33] Authenticated key agreement scheme with privacy-protection in the three-party setting Lin, J.-P. (jplin@mail.chihlee.edu.tw), 1600, Femto Technique Co., Ltd. (15):
- [35] Tripartite authenticated key agreement protocols from pairings CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2003, 2898 : 332 - 359
- [36] A Survey of Authenticated Key Agreement Protocols for Securing IoT 2019 IEEE JORDAN INTERNATIONAL JOINT CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATION TECHNOLOGY (JEEIT), 2019, : 425 - 430
- [37] Authenticated Diffie-Hellman key agreement protocols SELECTED AREAS IN CRYPTOGRAPHY, 1999, 1556 : 339 - 361
- [38] New secure explicitly authenticated key agreement protocols IAENG TRANSACTIONS ON ENGINEERING SCIENCES, 2014, : 357 - 368
- [39] Certificate-Based Authenticated Key Agreement Protocols 2013 INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS TECHNOLOGY (ICCAT), 2013,
- [40] Security analysis on tripartite authenticated key agreement protocols 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4653 - +