Author:
Wang Ren-Chiun,Juang Wen-Shenq,Lei Chin-Laung
Subject
Applied Mathematics,Computational Theory and Mathematics,Computer Networks and Communications,Theoretical Computer Science
Reference21 articles.
1. SSL/TLS session-aware user authentication—Or how to effectively thwart the man-in-the-middle;Oppliger;Comput. Commun.,2006
2. J. Kohl, C. Neuman, The kerberos network authentication service (v5), IETF RFC1510.
3. EC2C-PAKA: An efficient client-to-client password-authenticated key agreement;Byun;Inform. Sci.,2007
4. Efficient password authenticated key agreement using smart cards;Juang;Computers & Security,2004
5. Efficient user authentication and key agreement in ubiquitous computing;Juang,2006
Cited by
19 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献