Author:
Chang Ting-Yi,Hwang Min-Shiang,Yang Wei-Pang
Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference37 articles.
1. M. Bellare, D. Pointcheval, P. Rogaway, “Authenticated key exchange secure against dictionary attack”, in: Advances in Cryptology-EUROCRYPT’00, 2000, pp. 122–138.
2. M. Bellare, P. Rogaway, “Entity authentication and key distribution”, in: Advances in Cryptology-CRYPTO ’93, 1993, pp. 232–249.
3. M. Bellare, P. Rogaway, Provably secure session key distribution the three party case, in: Proceedings of the 27th ACM Symposium on the Theory of Computing, 1995.
4. S.M. Bellovin, M. Merritt, “Encrypted key exchange: Password-based protocols secure against dictionary attacks”, in: Proceedings of 1992 IEEE Computer Society Conference on Research in Security and Privacy, 1992, pp. 72–84.
5. A novel three-party encrypted key exchange protocol;Chang;Computer Standards & Interfaces,2004
Cited by
62 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献