Author:
Wang Chien-Ming,Wang Chih-Hung
Publisher
Springer International Publishing
Reference27 articles.
1. Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Advances in Cryptology CRYPTO 1993, pp. 110–125. Springer (1993)
2. Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: ACM Conference on Computer and Communications Security, pp. 62–73 (1993)
3. Chen, L., Lim, H.W., Yang, G.: Cross-domain password-based authenticated key exchange revisited. In: Proceedings of the 32nd IEEE International Conference on Computer Communications (INFOCOM), pp. 1052–1060 (2013)
4. Chen, L., Kudla, C.: Identity-based authenticated key agreement protocols from pairings. In: Proceeding of the 16th IEEE Computer Security Foundations Workshop, pp. 219–233. IEEE Computer Society Press (2003)
5. Cheng, Q.F., Han, G.G., Ma, C.G.: A new efficient and strongly secure authenticated key exchange protocol. In: Fifth International Conference on Information Assurance and Security, pp. 499–502 (2009)