1. C. Gunther: An Identity-based Key-exchange Protocol, Advances in Cryptology-Eurocrypto’89, Springer-Verlag, 1990, pp. 29–37, 1989.
2. A. Aziz: SKIP Extension for Perfect Forward Secrecy, Available from http://www.skip-vpm.org/wetice98/HacknSlash.html .
3. M. Bellare and S. K. Miner: A Forward-Secure Digital Signature Scheme, Advances in Cryptology-Crypto’ 99, Springer-Verlag, 1999.
4. Lect Notes Comput Sci;D. Park,2000
5. K. Lee, S. Moon, W. Jeong, and T. Kim: A-2-pass Authentication and Key Agreement Protocol for Mobile Communications, Proceedings of The 2nd International Conference on Information Security and Cryptology, ICISC’99, pp. 143–155, Dec.1999.