1. Simple password-based encrypted key exchange protocols;Abdalla,2005
2. Interactive Diffie–Hellman assumptions with applications to password-based authentication;Abdalla,2005
3. One-time verifier-based encrypted key exchange;Abdalla,2005
4. Password-based authenticated key exchange in the three-party setting;Abdalla,2005
5. Provably secure session key distribution-the three party case;Bellare,1996