Author:
Kumar Adarsh,Aggarwal Alok,Charu
Publisher
Springer Berlin Heidelberg
Reference39 articles.
1. Boyd, C., Mathuria, A.: Protocols for Authentication and Key Establishment, 1st edn. Springer (2003)
2. van Tilborg, H.C.A.: Encyclopedia of Cryptography and Security. Springer (2005)
3. Hellman, M.E.: An Overview of Public Key Cryptography. IEEE Communications Society Magazine 16, 24–32 (1978)
4. Wen, H.A., Lin, C.L., Hwang, T.: Provably secure authenticated key exchange protocols for low power computing clients. Computers and Security 25, 106–113 (2006)
5. Vesteras, B.: Analysis of Key Agreement Protocols. Master’s Thesis Report, Department of Computer Science and Media Technology, Gjovik University College (2006)
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Text encryption for lower text size: Design and implementation;Materials Today: Proceedings;2023
2. Advantages of using Containerization Approach for Advanced Version Control System;2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT);2022-12-26
3. Improving Business deliveries using Continuous Integration and Continuous Delivery using Jenkins and an Advanced Version control system for Microservices-based system;2022 5th International Conference on Multimedia, Signal Processing and Communication Technologies (IMPACT);2022-11-26
4. Biorthogonality Collection of Finite System of Functions in Multiresolution Analysis on L2(K);2022 10th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO);2022-10-13
5. Engineering Web resource summaries using Pointwise mutual information (PMI)-based for web document summarization;2022 International Conference on Innovations in Science and Technology for Sustainable Development (ICISTSD);2022-08-25