Author:
Yang Huibo,Chen Jianhua,Zhang Yuanyuan
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference18 articles.
1. Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory IT, 22(6), 644–654. doi: 10.1109/TIT.1976.1055638 .
2. Bellovin, S. M., & Merrit, M. (1992). Encrypted key exchange: Password-based protocols secure against dictionary attacks. In Proceedings of IEEE symposium on research in security and privacy (pp. 72–84). Oakland: IEEE.
3. Bellare, M., & Rogaway, P. (1993). Entity authentication and key distribution. In Advances in Cryptology—Crypto’93 (pp. 232–249). Berlin: Springer.
4. Bellar, M., & Pointcheval, D. (2000). Authenticated key exchange secure against dictionary attacks. In Advances in Cryptology—Eurocrypt’00 (pp. 232–249). Berlin: Springer.
5. Vergados, D., & Stergiou, G. (2007). An authentication scheme for ad-hoc networks using threshold secret sharing. Wireless Personal Communications, 43(4), 1767–1780.
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献