Funder
Liaoning Provincial Natural Science Foundation of China
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference25 articles.
1. Bresson, E., Chevassut, O., & Pointcheval, D. (2002). Group Diffie–Hellman key exchange secure against dictionary attacks. Advances in Cryptology, 2501, 497–514.
2. Wang, L. M., & Wu, C. K. (2006). Identity based group key agreement from bilinear pairing. WuHan University Journal of Natural Sciences, 11(6), 1731–1735.
3. Guo, X., & Zhang, J. (2010). Secure group key agreement protocol based on chaotic Hash. Information Sciences, 180(20), 4069–4074.
4. Teng, J. K., Wu, C. K., & Tian, Y. L. (2015). A strongly secure identity-based authenticated group key exchange protocol. Science China Information Sciences, 58(9), 1–12.
5. Han, S. (2008). Security of a key agreement protocol based on chaotic maps. Chaos, Solitons and Fractals, 38(3), 764–768.
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献