Affiliation:
1. University of Surrey
2. NTT Information Sharing Platform Laboratories, NTT Corporation
3. Izmir Institute of Technology
Publisher
Institute of Electronics, Information and Communications Engineers (IEICE)
Subject
Applied Mathematics,Electrical and Electronic Engineering,Computer Graphics and Computer-Aided Design,Signal Processing
Reference36 articles.
1. [6] J. Baek, R. Safavi-Naini, and W. Susilo, “Efficient multi-receiver identity-based encryption and its application to broadcast encryption,” PKC 2005, pp.380-397, 2005.
2. [7] M. Bellare, R. Canetti, and H. Krawczyk, “A modular approach to the design and analysis of authentication and key exchange protocols,” STOC 1998, pp.419-428, ACM, 1998.
3. [8] M. Bellare, D. Pointcheval, and P. Rogaway, “Authenticated key exchange secure against dictionary attacks,” EUROCRYPT 2000, LNCS, vol.1807, pp.139-155, Springer, 2000.
4. [9] M. Bellare and P. Rogaway, “Entity authentication and key distribution,” Advances in Cryptology — CRYPTO'93, LNCS, vol.773, pp.232-249, 1993.
5. [10] S.M. Bellovin and M. Merritt, “Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise,” ACM CCS 1993, pp.244-250, ACM, 1993.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献