1. Lecture Notes in Computer Science;M. Backes,2003
2. Bellare, M., Canetti, R., Krawczyk, H.: A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols. In: The 30th Annual ACM Symposium on Theory of Computing, pp. 419–428. ACM Press, New York (1998)
3. Lecture Notes in Computer Science;M. Bellare,2000
4. Lecture Notes in Computer Science;M. Bellare,1994
5. Bellare, M., Rogaway, P.: Provably Secure Session Key Distribution: The Three Party Case. In: Proceedings of the 27th Annual Symposium on the Theory of Computing, pp. 57–66. ACM Press, New York (1995)