共 50 条
- [41] Comparative Analysis of Internet Key Exchange Protocols 2015 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES (ICICT), 2015,
- [42] Security Verification for Authentication and Key Exchange Protocols INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (03): : 1 - 11
- [43] Modelling Time for Authenticated Key Exchange Protocols COMPUTER SECURITY - ESORICS 2014, PT II, 2014, 8713 : 277 - 294
- [45] Downgrade Resilience in Key-Exchange Protocols 2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2016, : 506 - 525
- [46] Analysis of Two Authenticated Key Exchange Protocols MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 398 - +
- [48] Key exchange protocols for multiparty communication services Hosei University (Institute of Electrical and Electronics Engineers Inc., United States):
- [50] Key exchange protocols for multiparty communication services FIRST INTERNATIONAL SYMPOSIUM ON CYBER WORLDS, PROCEEDINGS, 2002, : 241 - 248