Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference35 articles.
1. Farash, M. S., Bayat, M., & Attari, M. A. (2011). Vulnerability of two multiple-key agreement protocols. Computers & Electrical Engineering, 37(2), 199–204.
2. Farash, M. S., Attari, M. A., & Bayat, M. (2012). A certificateless multiple-key agreement protocol without one-way hash functions based on bilinear pairings. IACSIT International Journal of Engineering and Technology, 4(3), 321–325.
3. Farash, M. S., Attari, M. A., Atani, R. E., & Jami, M. (2013). A new efficient authenticated multiple-key exchange protocol from bilinear pairings. Computers & Electrical Engineering, 39(2), 530–541.
4. Farash, M. S., & Attari, M. A. (2013). Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC. The ISC International Journal of Information Security, 5(1), 1–15.
5. Farash, M. S., & Attari, M. A. (2014). A pairing-free ID-based key agreement protocol with different PKGs. International Journal of Network Security, 16(2), 143–148.
Cited by
19 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献