共 50 条
- [31] Security analysis of a password authenticated key exchange protocol INFORMATION SECURITY, PROCEEDINGS, 2003, 2851 : 208 - 217
- [33] Key agreement protocols and their security analysis (Extended abstract) CRYPTOGRAPHY AND CODING, PROCEEDINGS, 1997, 1355 : 30 - 45
- [34] Key Generation and Security Analysis of Text Cryptography using Cubic Power of Pell's Equation 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING, INSTRUMENTATION AND CONTROL TECHNOLOGIES (ICICICT), 2017, : 1496 - 1500
- [35] Security analysis on tripartite authenticated key agreement protocols 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4653 - +
- [36] Security Analysis of the PACE Key-Agreement Protocol INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 : 33 - 48
- [37] Security Analysis of an Improved MFE Public Key Cryptosystem CRYPTOLOGY AND NETWORK SECURITY, 2011, 7092 : 118 - 125
- [38] Security in Cloud Computing: An Analysis of Key Drivers and Constraints INFORMATION SECURITY JOURNAL, 2011, 20 (03): : 123 - 127
- [39] KEY ASSETS FOR BUILDING RETIREMENT SECURITY: INSTITUTIONAL, COMMUNITY, AND EXTENDED FAMILY RESOURCES GERONTOLOGIST, 2015, 55 : 832 - 832
- [40] Security analysis of public-key watermarking schemes MATHEMATICS OF DATA/IMAGE CODING, COMPRESSION, AND ENCRYPTION IV, WITH APPLICATIONS, 2001, 4475 : 172 - 182