Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference50 articles.
1. S.S. Al-Riyami, K.G. Paterson, Certificateless public cryptography. Advances in Cryptology-Asiacrypt 2003, LNCS, vol. 2894, 2003, pp. 452–473.
2. M. Bellare, P. Rogaway, Entity authentication and key distribution, Advances in Cryptology-Crypto’93, LNCS, vol.773, 1993, pp. 232–249.
3. S. Blake-Wilson, D. Johnson, A. Menezes, Key agreement protocols and their security analysis, in: 6th IMA International Conference on Cryptography and Coding, LNCS, vol. 1355, 1997, pp. 30–45.
4. PF-ID-2PAKA: pairing free identity-based two-party authenticated key agreement protocol for wireless sensor networks;Bala;Wireless Pers. Commun.,2016
5. non-interactive certificateless two-party authenticated key agreement protocol for wireless sensor networks;Bala;Int. J. Ad Hoc Ubiq Co.,2016
Cited by
42 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献