-
2
-
-
84949230533
-
Key agreement protocols and their security analysis
-
S. Blake-Wilson, D. Johnson, A. Menezes, Key agreement protocols and their security analysis, in: Proceedings of the 6th IMA International Conference on Cryptography and Coding, 1997, pp. 30-45.
-
(1997)
Proceedings of the 6th IMA International Conference on Cryptography and Coding
, pp. 30-45
-
-
Blake-Wilson, S.1
Johnson, D.2
Menezes, A.3
-
3
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
LNCS
-
D. Boneh, M. Franklin, Identity-based encryption from the weil pairing. in: Proceedings of the CRYPTO2001, LNCS, vol. 2139, pp.213-229, 2001.
-
(2001)
Proceedings of the CRYPTO2001
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
4
-
-
77951274055
-
Identity-based authentication key agreement protocols without bilinear pairings
-
X. Cao, W. Kou, Y. Yu, and R. Sun Identity-based authentication key agreement protocols without bilinear pairings IEICE Trans. Fundam. E91-A 12 2008 3833 3836
-
(2008)
IEICE Trans. Fundam.
, vol.91
, Issue.12
, pp. 3833-3836
-
-
Cao, X.1
Kou, W.2
Yu, Y.3
Sun, R.4
-
5
-
-
69549116775
-
Identity-based anonymous remote authentication for value-added services in mobile networks
-
X. Cao, X. Zeng, W. Kou, and L. Hu Identity-based anonymous remote authentication for value-added services in mobile networks IEEE Trans. Veh. Technol. 58 7 2009 3508 3517
-
(2009)
IEEE Trans. Veh. Technol.
, vol.58
, Issue.7
, pp. 3508-3517
-
-
Cao, X.1
Zeng, X.2
Kou, W.3
Hu, L.4
-
6
-
-
67849099096
-
Certificateless threshold ring signature
-
S. Chang, D.S. Wong, Y. Mu, and Z. Zhang Certificateless threshold ring signature Inform. Sci. 179 20 2009 3685 3696
-
(2009)
Inform. Sci.
, vol.179
, Issue.20
, pp. 3685-3696
-
-
Chang, S.1
Wong, D.S.2
Mu, Y.3
Zhang, Z.4
-
7
-
-
34347393777
-
Identity-based key agreement protocols from pairings
-
L. Chen, Z. Cheng, and N.P. Smart Identity-based key agreement protocols from pairings Int. J. Inf. Secur. 6 2007 213 241
-
(2007)
Int. J. Inf. Secur.
, Issue.6
, pp. 213-241
-
-
Chen, L.1
Cheng, Z.2
Smart, N.P.3
-
9
-
-
10444220191
-
Efficient identity-based authenticated key agreement protocol from pairings
-
Y. Choie, E. Jeong, and E. Lee Efficient identity-based authenticated key agreement protocol from pairings Appl. Math. Comput. 162 2005 179 188
-
(2005)
Appl. Math. Comput.
, Issue.162
, pp. 179-188
-
-
Choie, Y.1
Jeong, E.2
Lee, E.3
-
10
-
-
37549067642
-
Mobile IP registration in certificateless public key infrastructure
-
L. Dang, W. Kou, N. Dang, and H. Li Mobile IP registration in certificateless public key infrastructure IET Inf. Secur. 1 4 2007 167 173
-
(2007)
IET Inf. Secur.
, vol.1
, Issue.4
, pp. 167-173
-
-
Dang, L.1
Kou, W.2
Dang, N.3
Li, H.4
-
11
-
-
23944461491
-
A one-round protocol for tripartite Diffie-Hellman
-
A. Joux A one-round protocol for tripartite Diffie-Hellman J. Cryptology 17 2004 263 276
-
(2004)
J. Cryptology
, vol.17
, pp. 263-276
-
-
Joux, A.1
-
12
-
-
67649746889
-
An unknown key-share attack on the MQV key agreement protocol
-
B.S. Kaliski Jr An unknown key-share attack on the MQV key agreement protocol ACM Trans. Inf. Syst. Secur. 4 3 2001 275 288
-
(2001)
ACM Trans. Inf. Syst. Secur.
, vol.4
, Issue.3
, pp. 275-288
-
-
Kaliski Jr., B.S.1
-
13
-
-
33646756559
-
Modular security proofs for key agreement protocols
-
LNCS 3788
-
C. Kudla, K.G. Paterson, Modular security proofs for key agreement protocols, in: Proceedings of the ASIACRYPT 2005, LNCS 3788, 2005, pp. 549-565.
-
(2005)
Proceedings of the ASIACRYPT 2005
, pp. 549-565
-
-
Kudla, C.1
Paterson, K.G.2
-
15
-
-
36248988077
-
On broadcast authentication in wireless sensor networks
-
K. Ren, W. Lou, K. Zeng, and P.J. Moran On broadcast authentication in wireless sensor networks IEEE Trans. Wireless Commun. 6 11 2007 4136 4144
-
(2007)
IEEE Trans. Wireless Commun.
, vol.6
, Issue.11
, pp. 4136-4144
-
-
Ren, K.1
Lou, W.2
Zeng, K.3
Moran, P.J.4
-
16
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
LNCS
-
A. Shamir, Identity-based cryptosystems and signature schemes, in: Proceedings of CRYPTO1984, LNCS, vol.196, 1984, pp. 47-53.
-
(1984)
Proceedings of CRYPTO1984
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
17
-
-
40249088138
-
Certificate-based verifiably encrypted signatures from pairings
-
Z. Shao Certificate-based verifiably encrypted signatures from pairings Inf. Sci. 178 10 2008 2360 2373
-
(2008)
Inf. Sci.
, vol.178
, Issue.10
, pp. 2360-2373
-
-
Shao, Z.1
-
18
-
-
78049253256
-
-
Shamus Software Ltd., Miracl library
-
Shamus Software Ltd., Miracl library. .
-
-
-
-
19
-
-
0037142442
-
An identity-based authenticated key agreement protocol based on the Weil pairing
-
N.P. Smart An identity-based authenticated key agreement protocol based on the Weil pairing Electron. Lett. 38 2002 630 632
-
(2002)
Electron. Lett.
, Issue.38
, pp. 630-632
-
-
Smart, N.P.1
-
20
-
-
55949109421
-
An improved identity-based key agreement protocol and its security proof
-
S. Wang, Z. Cao, K.R. Choo, and L. Wang An improved identity-based key agreement protocol and its security proof Inf. Sci. 179 3 2009 307 318
-
(2009)
Inf. Sci.
, vol.179
, Issue.3
, pp. 307-318
-
-
Wang, S.1
Cao, Z.2
Choo, K.R.3
Wang, L.4
-
21
-
-
34548038583
-
A survey of key management schemes in wireless sensor networks
-
DOI 10.1016/j.comcom.2007.04.009, PII S0140366407001752
-
Y. Xiao, V.K. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway A survey of key management schemes in wireless sensor networks Comput. Commun. 30 2007 2314 2341 (Pubitemid 47285291)
-
(2007)
Computer Communications
, vol.30
, Issue.11-12
, pp. 2314-2341
-
-
Xiao, Y.1
Rayi, V.K.2
Sun, B.3
Du, X.4
Hu, F.5
Galloway, M.6
-
22
-
-
34248229210
-
An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices
-
R.W. Zhu, G. Yang, and D.S. Wong An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices Theor. Comput. Sci. 9 378 2007 198 207
-
(2007)
Theor. Comput. Sci.
, vol.9
, Issue.378
, pp. 198-207
-
-
Zhu, R.W.1
Yang, G.2
Wong, D.S.3
|