Author:
Yu Xinying,Zhang Kejun,Suo Zhufeng,Wang Jun,Wang Wenbin,Zou Bing
Reference35 articles.
1. Abdalla, M., Fouque, P.-A., Pointcheval, D., 2005. Password-Based Authenticated Key Exchange in the Three-Party Setting. In: International Conference on Theory and Practice of Public Key Cryptography, vol. 153. pp. 65–84.
2. Authenticated key exchange secure against dictionary attacks;Bellare;IACR Cryptol. ePrint Arch.,2000
3. Bellare, M., Rogaway, P., 1993. Entity Authentication and Key Distribution. In: Annual International Cryptology Conference. pp. 232–249.
4. Bio-AKA: An efficient fingerprint based two factor user authentication and key agreement scheme;Bian;Future Gener. Comput. Syst.,2020
5. PUF based authentication protocol for IoT;Braeken;Symmetry,2018