Subject
Computer Science Applications,Information Systems,Signal Processing,Theoretical Computer Science
Reference19 articles.
1. Steven M. Bellovin, Michael Merritt, Encrypted key exchange: Password-based protocols secure against dictionary attacks, in: IEEE Symposium on Research in Security and Privacy, 1992, pp. 72–84.
2. Key agreement protocols and their security analysis;Blake-Wilson,1997
3. A round- and computation-efficient three-party authenticated key exchange protocol;Chen;J. Syst. Softw.,2008
4. Y. Chen, J.S. Chou, C.H. Huang, Comment on four two-party authentication protocols, Cryptology ePrint Archive, report 2010/165, 2010, http://eprint.iacr.org/.
5. New directions in cryptography;Diffie;IEEE Trans. Inform. Theory,1976
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献