Publisher
Springer Science and Business Media LLC
Subject
Computational Theory and Mathematics,Hardware and Architecture,Software,Computer Science (miscellaneous)
Reference18 articles.
1. Lecture Notes in Computer Science;M Bellare,1994
2. Lecture Notes in Computer Science;M Bellare,2000
3. Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: Pfitzmann, B. (ed.) Advances in Cryptology—EUROCRYPT 2001. Lecture Notes in Computer Science, vol. 2045, pp. 453–474. Springer, Berlin, Heidelberg (2001)
4. Kobara, K., Shin, S., Strefler, M.: Partnership in key exchange protocols. Proceedings of the 4th International Symposium on Information, Computer, and Communications Security (ASIACCS’09), 161–170 (2009)
5. Jeong, I.R., Katz, J., Lee, D.H.: One-Round Protocols for Two-Party Authenticated Key Exchange. https://www.cs.umd.edu/~jkatz/papers/1round_AKE.pdf (2008)