-
1
-
-
34447321042
-
EC2C-PAKA: an efficient client-to-client password-authenticated key agreement
-
Byun J.W., Lee D.H., and Lim J.I. EC2C-PAKA: an efficient client-to-client password-authenticated key agreement. Information Sciences 177 19 (2007) 3995-4013
-
(2007)
Information Sciences
, vol.177
, Issue.19
, pp. 3995-4013
-
-
Byun, J.W.1
Lee, D.H.2
Lim, J.I.3
-
2
-
-
33846811464
-
Identity-based conference key distribution protocol with user anonymity
-
Cai Y., and Wang Y. Identity-based conference key distribution protocol with user anonymity. Chinese Journal of Electronics 16 1 (2008) 179-181
-
(2008)
Chinese Journal of Electronics
, vol.16
, Issue.1
, pp. 179-181
-
-
Cai, Y.1
Wang, Y.2
-
3
-
-
41649104135
-
Privacy-enhancing authenticated key agreement protocols based on elliptic curve cryptosystem
-
Cao T.J., and Lei H. Privacy-enhancing authenticated key agreement protocols based on elliptic curve cryptosystem. Acta Electronica Sinica 36 2 (2008) 397-401
-
(2008)
Acta Electronica Sinica
, vol.36
, Issue.2
, pp. 397-401
-
-
Cao, T.J.1
Lei, H.2
-
6
-
-
84874800178
-
A public-key cryptosystem and a signature scheme based on discrete logarithms
-
ElGamal T. A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory IT-31 4 (1985) 469-472
-
(1985)
IEEE Transactions on Information Theory
, vol.IT-31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
7
-
-
56949085611
-
-
A.O. Freier, P. Karlton, P.C. Kocher, Secure Socket Layer 3.0, Internet Draft, 1996.
-
A.O. Freier, P. Karlton, P.C. Kocher, Secure Socket Layer 3.0, Internet Draft, 1996.
-
-
-
-
8
-
-
56949106276
-
-
J. Kohl, C. Neuman, The Kerberos authentication service (v5), Internet RFC 1510, 1993.
-
J. Kohl, C. Neuman, The Kerberos authentication service (v5), Internet RFC 1510, 1993.
-
-
-
-
9
-
-
0034225062
-
User identification and key distribution maintaining anonymity for distributed computer network
-
Lee W.B., and Chang C.C. User identification and key distribution maintaining anonymity for distributed computer network. Computer Systems Science and Engineering 15 4 (1999) 113-116
-
(1999)
Computer Systems Science and Engineering
, vol.15
, Issue.4
, pp. 113-116
-
-
Lee, W.B.1
Chang, C.C.2
-
10
-
-
33748125161
-
A secure identification and key agreement protocol with user anonymity (SIKA)
-
Mangipudi K., and Katti R. A secure identification and key agreement protocol with user anonymity (SIKA). Computers and Security 25 6 (2006) 420-425
-
(2006)
Computers and Security
, vol.25
, Issue.6
, pp. 420-425
-
-
Mangipudi, K.1
Katti, R.2
-
12
-
-
0017930809
-
A method for obtaining digital signature and public-key cryptosystem
-
Rivest R., Shamir A., and Adleman L. A method for obtaining digital signature and public-key cryptosystem. Communications of the ACM 21 2 (1978) 120-126
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
13
-
-
1542335490
-
Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks
-
Wu T.S., and Hsu C.L. Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks. Computers and Security 23 2 (2004) 120-125
-
(2004)
Computers and Security
, vol.23
, Issue.2
, pp. 120-125
-
-
Wu, T.S.1
Hsu, C.L.2
-
14
-
-
43849103766
-
Recursive protocol for group-oriented authentication with key distribution
-
Wu T.C., Huang T.T., Hsu C.L., and Tsai K.Y. Recursive protocol for group-oriented authentication with key distribution. Journal of Systems and Software 81 7 (2008) 1227-1239
-
(2008)
Journal of Systems and Software
, vol.81
, Issue.7
, pp. 1227-1239
-
-
Wu, T.C.1
Huang, T.T.2
Hsu, C.L.3
Tsai, K.Y.4
-
15
-
-
10644225185
-
New efficient user identification and key distribution scheme providing enhanced security
-
Yang Y., Wang S., Bao F., Wang J., and Deng R.H. New efficient user identification and key distribution scheme providing enhanced security. Computers and Security 23 8 (2004) 697-704
-
(2004)
Computers and Security
, vol.23
, Issue.8
, pp. 697-704
-
-
Yang, Y.1
Wang, S.2
Bao, F.3
Wang, J.4
Deng, R.H.5
|