Author:
Bao Shudi,Poon Carmen C. Y.,Shen Lianfeng,Zhang Yuanting
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering
Reference11 articles.
1. A. Menezes, P. van Oorschot, S. Vanstone. Handbook of Applied Cryptography. Florida, USA, CRC Press, 1996, 489–533.
2. R. M. Needham, M. D. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(1978)12, 993–999.
3. R. H. Deng, L. Gong, A. A. Lazar, et al. Authenticated key distribution and secure broadcast using no conventional encryption: A unified approach based on block codes. Proc. of IEEE Globe Telecommunications Conference, Singapore, Nov. 13–19, 1995, vol.2, 1193–1197.
4. Q. Huang, J. Cukier, H. Kobayashi, et al. Fast authenticated key establishment protocols for self-organizing sensor networks. Proc. of the 2nd ACM International Conference on Wireless Sensor Networks and Applications, San Diego, USA, Sept. 19, 2003, vol.2, 141–150.
5. M. Abdalla, P. A. Fouque, D. Pointcheval. Password-based authenticated key exchange in the three-party setting. IEE proceedings, 153(2006)1, 27–39.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献