共 50 条
- [31] Another Security Weakness in an Authenticated Group Key Agreement JOURNAL OF INTERNET TECHNOLOGY, 2010, 11 (04): : 573 - 576
- [32] Identity based authenticated group key agreement protocol PROGRESS IN CRYPTOLOGY - INDOCRYPT 2002, PROCEEDINGS, 2002, 2551 : 215 - 233
- [34] An ID -based Dynamic Authenticated Group Key Agreement scheme with Optimal Round Complexity from Pairings PROCEEDINGS OF 2016 10TH INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT, AND SOFTWARE INTENSIVE SYSTEMS (CISIS), 2016, : 468 - 472
- [36] A Dynamic Scheme For Authenticated Group Key Agreement Protocol NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS AND NETWORKING, 2010, : 245 - 250
- [37] A new authenticated group key agreement in a mobile environment annals of telecommunications - annales des télécommunications, 2009, 64
- [38] Authenticated Group Key Agreement Protocol Without Pairing INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 606 - 618
- [39] A Secure Certificateless Authenticated Group Key Agreement Protocol MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 342 - 346