-
1
-
-
1542593353
-
Authentication and authenticated key exchanges
-
W. Diffie, P. C. Van Oorschot, and M. J. Wiener, "Authentication and authenticated key exchanges", Design, Codes and Cryptography, vol. 2, pp. 107-125, 1992.
-
(1992)
Design, Codes and Cryptography
, vol.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.C.2
Wiener, M.J.3
-
3
-
-
0032658583
-
Simple authenticated key agreement algorithm
-
D. H. Seo, and P. Sweeney, "Simple authenticated key agreement algorithm", Electronics Letters, vol. 35, no. 13, pp. 1073-1074, 1999.
-
(1999)
Electronics Letters
, vol.35
, Issue.13
, pp. 1073-1074
-
-
Seo, D.H.1
Sweeney, P.2
-
4
-
-
0034504654
-
Security enhancement for the simple authentication key agreement algorithm
-
I. C. Lin, C. C. Chang, and M. S. Hwang, "Security enhancement for the simple authentication key agreement algorithm", in Proc. of the 24th Annual International Computer Software and Application confernece, pp. 113-115, 2000.
-
(2000)
Proc. of the 24th Annual International Computer Software and Application confernece
, pp. 113-115
-
-
Lin, I.C.1
Chang, C.C.2
Hwang, M.S.3
-
5
-
-
26844485818
-
An efficient key agreement protocol for secure authetnication
-
LNCS 3043, Springer-Verlag
-
Y. S. Kim, E. N. Huh, J. H. Hwang, and B. W. Lee, "An efficient key agreement protocol for secure authetnication", in ICCAS 2004, LNCS 3043, pp. 746-754, Springer-Verlag, 2004.
-
(2004)
ICCAS 2004
, pp. 746-754
-
-
Kim, Y.S.1
Huh, E.N.2
Hwang, J.H.3
Lee, B.W.4
-
6
-
-
84976665942
-
Timestamps in key distribution protocols
-
D. Denning and G. Sacco, "Timestamps in key distribution protocols", Communications of the ACM, vol.24, no.8, 533-536, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.8
, pp. 533-536
-
-
Denning, D.1
Sacco, G.2
-
8
-
-
35248816546
-
Sigma: The 'sign-and-mac' approach to authenticated Diffie-Hellman and its use in the ikeprotocols
-
LNCS 2729, Springer-Verlag
-
H. Krawczyk, "Sigma: The 'sign-and-mac' approach to authenticated Diffie-Hellman and its use in the ikeprotocols", in Crypto 2003, LNCS 2729, pp. 400-425, Springer-Verlag, 2003.
-
(2003)
Crypto 2003
, pp. 400-425
-
-
Krawczyk, H.1
-
9
-
-
33646180371
-
On session key contruction in provably secure protocols
-
LNCS 3715, Springer-Verlag
-
K.-K. R. Choo, C. Boyd, and Y. Hitchcock, "On session key contruction in provably secure protocols", in 1st International Conference on Cryptology in Malaysia Mycrypt 2005, LNCS 3715, pp. 116-131, Springer-Verlag, 2005.
-
(2005)
1st International Conference on Cryptology in Malaysia Mycrypt 2005
, pp. 116-131
-
-
Choo, K.-K.R.1
Boyd, C.2
Hitchcock, Y.3
-
10
-
-
33748173666
-
"Revist of McCullagh-Barreto two-party ID-based authenticated key agreement protocols
-
Nov
-
K.-K. R. Choo, "Revist of McCullagh-Barreto two-party ID-based authenticated key agreement protocols",International Journal of Network Security, vol.1, no.3, 154-160, Nov. 2005.
-
(2005)
International Journal of Network Security
, vol.1
, Issue.3
, pp. 154-160
-
-
Choo, K.-K.R.1
-
11
-
-
84874914559
-
Revisting Lee, Kim, & Yoo authenticated key agreement protocol
-
Jan
-
K.-K. R. Choo, "Revisting Lee, Kim, & Yoo authenticated key agreement protocol", International Journal of Network Security, vol.2, no.1, 64-68, Jan. 2006.
-
(2006)
International Journal of Network Security
, vol.2
, Issue.1
, pp. 64-68
-
-
Choo, K.-K.R.1
|