Author:
Chou Chih-Ho,Tsai Kuo-Yu,Lu Chung-Fu
Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems,Theoretical Computer Science,Software
Reference24 articles.
1. Blake-Wilson S, Johnson D, Menezes A (1997) Key agreement protocols and their security analysis. In: Proc of the sixth IMA international conference on cryptography and coding, pp 30–45
2. Borisov N, Goldberg I, Wagner D (2001) Intercepting mobile communications: the insecurity of 802.11. In: Proc of the 7th international conference on mobile computing and networking, pp 180–189. doi: 10.1145/381677.381695
3. Canetti R, Krawczyk H (2001) Analysis of key-exchange protocols and their use for building secure channels. In: Proc of advances in cryptology—EUROCRYPT 2001, Innsbruck, Austria, pp 453–474. doi: 10.1007/3-540-44987-6_28
4. Chen TH, Lee WB, Chen HB (2008) A round-and computation-efficient three-party authenticated key exchange protocol. J Syst Softw 81:1581–1590. doi: 10.1016/j.jss.2007.11.720
5. Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory IT-22(6):644–654. doi: 10.1109/TIT.1976.1055638
Cited by
31 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献