Author:
Zhang Lei,Zhang Futai,Wu Qianhong,Domingo-Ferrer Josep
Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference30 articles.
1. Certificateless public key cryptography;Al-Riyami,2003
2. Entity authentication and key distribution;Bellare,1994
3. M. Bellare, P. Rogaway, Random oracles are practical: a paradigm for designing efficient protocols, in: Proceedings of the ACM CCCS 1993, ACM, 1993, pp. 62–73.
4. Authenticated key exchange secure against dictionary attacks;Bellare,2000
5. Key agreement protocols and their security analysis;Blake-Wilson,1997
Cited by
59 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献