1. Aiello, W., Bellovin, S.M., Blaze, M., Canetti, R., Ioannidis, J., Keromytis, A.D., Reingold, O.: Efficient, DoS-resistant, Secure Key Exchange for Internet Protocols. In: Proc. of the 9th CCS, pp. 48–58. ACM Press, New York (2002)
2. Lecture Notes in Computer Science;M. Bellare,2000
3. Bellare, M., Rogaway, P.: The AuthA Protocol for Password-Based Authenticated Key Exchange. Contributions to IEEE P1363 (March 2000), Available from,
http://grouper.ieee.org/groups/1363/
4. Bellare, M., Rogaway, P.: Random Oracles Are Practical: a Paradigm for Designing Efficient Protocols. In: Proc. of the 1st CCS, pp. 62–73. ACM Press, New York (1993)
5. Bellovin, S.M., Merritt, M.: Encrypted Key Exchange: Password-Based Protocols Secure against Dictionary Attacks. In: Proc. of the Symposium on Security and Privacy, pp. 72–84. IEEE, Los Alamitos (1992)