Subject
Law,Hardware and Architecture,Software
Reference22 articles.
1. Many-to-one trapdoor functions and their relations to public-key cryptosystems;Bellare,1998
2. Encrypted key exchange: password-based protocols secure against dictionary attacks;Bellovin,1992
3. A novel three-party encrypted key exchange protocol;Chang;Computer Standards & Interfaces,2004
4. A round- and computation- efficient three-party authenticated key exchange protocol;Chen;The Journal of Systems and Software,2008
5. Security enhancement for a three-party encrypted key exchange protocol against undetectable online password guessing attacks;Chen;Computer Standards & Interfaces,2008
Cited by
20 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献