Author:
MacKenzie Philip,Shrimpton Thomas,Jakobsson Markus
Publisher
Springer Berlin Heidelberg
Cited by
69 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. How to Grant Anonymous Access;IEEE Transactions on Information Forensics and Security;2023
2. EKE Meets Tight Security in the Universally Composable Framework;Lecture Notes in Computer Science;2023
3. A Generic Construction of Tightly Secure Password-Based Authenticated Key Exchange;Advances in Cryptology – ASIACRYPT 2023;2023
4. Toward a Resilient Key Exchange Protocol for IoT;Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy;2022-04-14
5. Scalable, password-based and threshold authentication for smart homes;International Journal of Information Security;2022-02-07