Author:
Nam Junghyun,Lee Jinwoo,Kim Seungjoo,Won Dongho
Subject
Hardware and Architecture,Information Systems,Software
Reference41 articles.
1. Amir, Y., Kim, Y., Nita-Rotaru, C., Tsudik, G., 2002. On the performance of group key agreement protocols. In: Proceedings of 22nd IEEE Conference on Distributed Computing Systems, pp. 463–464. Full version available from:
2. New multiparty authentication services and key agreement protocols;Ateniese;IEEE Journal on Selected Areas in Communications,2000
3. Becker, K., Wille, U., 1998. Communication complexity of group key distribution. In: Proceedings of 5th ACM Conference on Computer and Communications Security (CCS’98), pp. 1–6
4. Bellare, M., Pointcheval, D., Rogaway, P., 2000. Authenticated key exchange secure against dictionary attacks. In: Eurocrypt’00, Lecture Notes in Computer Science 1807, pp. 139–155
5. Bellare, M., Rogaway, P., 1993. Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of 1st ACM Conference on Computer and Communications Security (CCS’93), pp. 62–73
Cited by
40 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献