共 50 条
- [3] Modelling Time for Authenticated Key Exchange Protocols COMPUTER SECURITY - ESORICS 2014, PT II, 2014, 8713 : 277 - 294
- [4] Scalable Protocols for Authenticated Group Key Exchange Journal of Cryptology, 2007, 20 : 85 - 113
- [6] Scalable protocols for authenticated group key exchange ADVANCES IN CRYPTOLOGY-CRYPTO 2003, PROCEEDINGS, 2003, 2729 : 110 - 125
- [7] Analysis of Two Authenticated Key Exchange Protocols MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 398 - +
- [8] Certificateless and Identity based Authenticated Key Exchange Protocols E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2014, 2015, 554 : 255 - 277
- [9] Authenticated Key Exchange Protocols Based on Factoring Assumption PROVABLE SECURITY, 7TH INTERNATIONAL CONFERENCE, PROVSEC 2013, 2013, 8209 : 21 - 37
- [10] Elliptic curve based password authenticated key exchange protocols INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2001, 2119 : 487 - 501