Funder
National Natural Science Foundation of China
Publisher
Springer Science and Business Media LLC
Reference26 articles.
1. Abdalla M, Fouque P, Pointcheval D (2005) Password-based authenticated key exchange in the three-party setting. In: Proceedings of international conference on theory and practice in public key cryptography, public key cryptography 2005. Springer, New York, pp 65–84
2. Al-Riyami S, Paterson K (2003) Certificateless public key cryptography. In: Proceedings of international conference on the theory and application of cryptology and information security, advances in cryptology—ASIACRYPT 2003. Springer, New York, pp 452–473
3. Alawatugoda J, Stebila D, Boyd C (2014) Modelling after-the-fact leakage for key exchange. In: Proceedings of the 9th ACM symposium on information, computer and communications security. ACM, pp 207–216
4. Bellare M, Chang L, Yacobi Y (1992) Security for personal communication services: public-key vs. private key approaches. In: Proceedings of the third IEEE international symposium on personal, indoor and mobile radio communications. IEEE, pp 26–31
5. Boneh D, Franklin M (2003) Identity-based encryption from the weil pairing. SIAM J Comput 32(3):586–615
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献