Publisher
Springer International Publishing
Reference10 articles.
1. Harn, L., Lin, C.: Authenticated group key transfer protocol based on secret sharing. IEEE Trans. Comput. 59(6), 842–846 (2010)
2. Kim, M., Park, N., Won, D.: Cryptanalysis of an authenticated group key transfer protocol based on secret sharing. In: Park, J.J(Jong Hyuk), Arabnia, H.R., Kim, C., Shi, W., Gil, J.-M. (eds.) GPC 2013. LNCS, vol. 7861, pp. 761–766. Springer, Heidelberg (2013)
3. Nam, J., Kim, M., Paik, J., Jeon, W., Lee, B., Won, D.: Cryptanalysis of a group key transfer protocol based on secret sharing. In: Kim, T., Adeli, H., Slezak, D., Sandnes, F.E., Song, X., Chung, K., Arnett, K.P. (eds.) FGIT 2011. LNCS, vol. 7105, pp. 309–315. Springer, Heidelberg (2011)
4. Olimid, R.F.: On the security of an authenticated group key transfer protocol based on secret sharing. In: Mustofa, K., Neuhold, E.J., Tjoa, A.M., Weippl, E., You, I. (eds.) ICT-EurAsia 2013. LNCS, vol. 7804, pp. 399–408. Springer, Heidelberg (2013)
5. Olimid, R.F.: A chain of attacks and countermeasures applied to a group key transfer protocol. In: Proceedings of International Joint Conference SOCO13 CISIS13 ICEUTE13, AISC 239, pp. 333–342, (2014)