Author:
Kumar D. Sravana,Suneetha C. H.,Sirisha P.
Reference18 articles.
1. Ku, W. C., & Wang, S. D. (2000). Cryptanalysis of modified authenticated key agreement protocol. Electronic Letters, 36(21), 1770–1771.
2. Aziz, A., & Diffie, W. (1994). A secure communications protocol to prevent unauthorized access: Privacy and authentication for wireless local area networks. In IEEE Personal Communications, pp. 25–31, first quarter.
3. Aydos, M., Sunar, B., & Koc, C. K. (1998). An elliptic curve cryptography based on authentication and key agreement protocol for wireless communications.
http://www.researchgate.net
.
4. Lee, C.-Y., Wang, Z.-H., Harn, L., & Chang, C.-C. (2011). Secure key transfer protocol based on secret sharing for group communications. IEICE Transactions, 94-D(11), 2069–2076.
5. Diffie, W., & Hellman, M. E. (1976). New directions in cryptography. IEEE Transactions on Information Theory, IT-22(6), 644–654.