Author:
Singh Mrityunjay,Mishra Dheerendra
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering
Reference51 articles.
1. Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644–654.
2. Shor, P. W. (1994). Algorithms for quantum computation: discrete logarithms and factoring, in: Proceedings 35th annual symposium on foundations of computer science, IEEE, pp. 124–134.
3. Shor, P. W. (1999). Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Review, 41(2), 303–332.
4. Juang, W.-S. (2006). Efficient user authentication and key agreement in wireless sensor networks. International workshop on information security applications (pp. 15–29). Berlin: Springer.
5. Amin, R., Islam, S. H., Biswas, G., Khan, M. K., Leng, L., & Kumar, N. (2016). Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks. Computer Networks, 101, 42–62.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献