共 50 条
- [21] Provable implementations of security protocols 21ST ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 2006, : 345 - 346
- [24] Key agreement protocols and their security analysis (Extended abstract) CRYPTOGRAPHY AND CODING, PROCEEDINGS, 1997, 1355 : 30 - 45
- [25] Analysis on Security Proof of Two Key Agreement Protocols NEW TRENDS AND APPLICATIONS OF COMPUTER-AIDED MATERIAL AND ENGINEERING, 2011, 186 : 531 - +
- [26] Security analysis and applications of standard key agreement protocols COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2003, PT 2, PROCEEDINGS, 2003, 2668 : 191 - 200
- [27] Security analysis on tripartite authenticated key agreement protocols 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4653 - +
- [29] A Provable-Security Mutual Authenticated Key Agreement Protocol for Mobile Communication 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4786 - +
- [30] ATwo-party Certificateless Authenticated Key Agreement Protocol with provable security 2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2013, : 559 - 563