-
1
-
-
77949553535
-
Cryptanalysis of two RFID authentication protocols
-
T. Cao and P. Shen, "Cryptanalysis of two RFID authentication protocols," International Journal of Network Security, vol. 9, no. 1, pp. 95-100, 2009.
-
(2009)
International Journal of Network Security
, vol.9
, Issue.1
, pp. 95-100
-
-
Cao, T.1
Shen, P.2
-
2
-
-
83655161144
-
Security enhancement for a modiffed authenticated key agreement protocol
-
C. C. Chang, K. F. Hwang, and I. C. Lin, "Security enhancement for a modiffed authenticated key agreement protocol," International Journal of Computational and Numerical Analysis and Applications, vol. 3, no. 1, pp. 1-7, 2003.
-
(2003)
International Journal of Computational and Numerical Analysis and Applications
, vol.3
, Issue.1
, pp. 1-7
-
-
Chang, C.C.1
Hwang, K.F.2
Lin, I.C.3
-
3
-
-
73149095465
-
An authenticated key agreement protocol using conjugacy problem in braid groups
-
A. Chaturvedi and S. Lal, "An authenticated key agreement protocol using conjugacy problem in braid groups," International Journal of Network Security, vol. 6, no. 2, pp. 181-184, 2008.
-
(2008)
International Journal of Network Security
, vol.6
, Issue.2
, pp. 181-184
-
-
Chaturvedi, A.1
Lal, S.2
-
4
-
-
33748173666
-
Revisit of McCullagh-Barreto two-party ID-based authenticated key agreement
-
K. K. R. Choo, "Revisit of McCullagh-Barreto two-party ID-based authenticated key agreement," International Journal of Network Security, vol. 1, no. 3, pp. 154-160, 2005.
-
(2005)
International Journal of Network Security
, vol.1
, Issue.3
, pp. 154-160
-
-
Choo, K.K.R.1
-
5
-
-
84874914559
-
Revisiting Lee, Kim, & Yoo authenticated key agreement protocol
-
K. K. R. Choo, "Revisiting Lee, Kim, & Yoo authenticated key agreement protocol," International Journal of Network Security, vol. 2, no. 1, pp. 64-68, 2006.
-
(2006)
International Journal of Network Security
, vol.2
, Issue.1
, pp. 64-68
-
-
Choo, K.K.R.1
-
7
-
-
84875281333
-
Queue-based group key agreement protocol
-
S. Hong, "Queue-based group key agreement protocol," International Journal of Network Security, vol. 9, no. 2, pp. 135-142, 2009.
-
(2009)
International Journal of Network Security
, vol.9
, Issue.2
, pp. 135-142
-
-
Hong, S.1
-
8
-
-
0038284947
-
Cryptanalysis of enhancement for simple authenticated key agreement algorithm
-
C. L. Hsu, T. S. Wu, T. C. Wu, and C. Mitchell, "Cryptanalysis of enhancement for simple authenticated key agreement algorithm," Applied Mathematics and Computation, vol. 142, no. 2-3, pp. 305-308, 2003.
-
(2003)
Applied Mathematics and Computation
, vol.142
, Issue.2-3
, pp. 305-308
-
-
Hsu, C.L.1
Wu, T.S.2
Wu, T.C.3
Mitchell, C.4
-
9
-
-
0037038584
-
Improved Yen-Joye's authenticated multiple-key agreement protocol
-
M. S. Hwang, C. W. Lin, and C. C. Lee, "Improved Yen-Joye's authenticated multiple-key agreement protocol," IEE Electronics Letters, vol. 38, no. 23, pp. 1429-1431, 2002.
-
(2002)
IEE Electronics Letters
, vol.38
, Issue.23
, pp. 1429-1431
-
-
Hwang, M.S.1
Lin, C.W.2
Lee, C.C.3
-
10
-
-
33646261491
-
Authenticated encryption schemes: Current status and key issues
-
M. S. Hwang and H. Y. Liu, "Authenticated encryption schemes: Current status and key issues," International Journal of Network Security, vol. 1, no. 2, pp. 61-73, 2005.
-
(2005)
International Journal of Network Security
, vol.1
, Issue.2
, pp. 61-73
-
-
Hwang, M.S.1
Liu, H.Y.2
-
11
-
-
73149093942
-
Effcient user authentication and key agreement with user privacy protection
-
W. S. Juang and J. L. Wu, "Effcient user authentication and key agreement with user privacy protection," International Journal of Network Security, vol. 7, no. 1, pp. 120-129, 2008.
-
(2008)
International Journal of Network Security
, vol.7
, Issue.1
, pp. 120-129
-
-
Juang, W.S.1
Wu, J.L.2
-
12
-
-
0034293729
-
Cryptanalysis of modiffed authenticated key agreement protocol
-
W. C. Ku and S. D. Wang, "Cryptanalysis of modiffed authenticated key agreement protocol," IEE Electronics Letters, vol. 36, no. 21, pp. 1770-1771, 2000.
-
(2000)
IEE Electronics Letters
, vol.36
, Issue.21
, pp. 1770-1771
-
-
Ku, W.C.1
Wang, S.D.2
-
13
-
-
0011637140
-
An improvement of a simple authenticated key agreement algorithm
-
Eric J. L. Lu and M. S. Hwang, "An improvement of a simple authenticated key agreement algorithm," Pakistan Journal of Applied Sciences, vol. 2, no. 1, pp. 64-65, 2002.
-
(2002)
Pakistan Journal of Applied Sciences
, vol.2
, Issue.1
, pp. 64-65
-
-
Lu, E.J.L.1
Hwang, M.S.2
-
14
-
-
33846349755
-
Authentication and key agreement protocols preserving anonymity
-
K. V. Mangipudi, R. S. Katti, and H. Fu, "Authentication and key agreement protocols preserving anonymity," International Journal of Network Security, vol. 3, no. 3, pp. 259-270, 2006.
-
(2006)
International Journal of Network Security
, vol.3
, Issue.3
, pp. 259-270
-
-
Mangipudi, K.V.1
Katti, R.S.2
Fu, H.3
-
15
-
-
0032658583
-
Simple authenticated key agreement algorithm
-
D. Seo and P. Sweeney, "Simple authenticated key agreement algorithm," IEE Electronics Letters, vol. 35, no. 13, pp. 1073-1074, 1999.
-
(1999)
IEE Electronics Letters
, vol.35
, Issue.13
, pp. 1073-1074
-
-
Seo, D.1
Sweeney, P.2
-
16
-
-
78651063942
-
Effcient nonce-based authentication scheme for session initiation protocol
-
J. L. Tsai, "Effcient nonce-based authentication scheme for session initiation protocol," International Journal of Network Security, vol. 9, no. 1, pp. 12-16, 2009.
-
(2009)
International Journal of Network Security
, vol.9
, Issue.1
, pp. 12-16
-
-
Tsai, J.L.1
-
17
-
-
0033640351
-
Weakness in simple authenticated key agreement protocol
-
Y. M. Tseng, "Weakness in simple authenticated key agreement protocol," IEE Electronics Letters, vol. 36, no. 1, pp. 48-49, 2000.
-
(2000)
IEE Electronics Letters
, vol.36
, Issue.1
, pp. 48-49
-
-
Tseng, Y.M.1
-
18
-
-
70350453453
-
Effcient certiffcate-less authentication and key agreement (CL-AK) for grid computing
-
S. Wang, Z. Cao, and H. Bao, "Effcient certiffcate-less authentication and key agreement (CL-AK) for grid computing," International Journal of Network Security, vol. 7, no. 3, pp. 342-347, 2008.
-
(2008)
International Journal of Network Security
, vol.7
, Issue.3
, pp. 342-347
-
-
Wang, S.1
Cao, Z.2
Bao, H.3
-
19
-
-
73149090428
-
Effcient identity-based authenticated key agreement protocol with PKG forward secrecy
-
S. Wang, Z. Cao, and F. Cao, "Effcient identity-based authenticated key agreement protocol with PKG forward secrecy," International Journal of Network Security, vol. 7, no. 2, pp. 181-186, 2008.
-
(2008)
International Journal of Network Security
, vol.7
, Issue.2
, pp. 181-186
-
-
Wang, S.1
Cao, Z.2
Cao, F.3
-
20
-
-
71649086263
-
Proof of forward security for password-based authenticated key exchange
-
S. Wu and Y. Zhu, "Proof of forward security for password-based authenticated key exchange," International Journal of Network Security, vol. 7, no. 3, pp. 335-341, 2008.
-
(2008)
International Journal of Network Security
, vol.7
, Issue.3
, pp. 335-341
-
-
Wu, S.1
Zhu, Y.2
-
21
-
-
84875321481
-
An improvement on a three-party password-based key exchange protocol using weil pairing
-
Z. Yong, J. F. Ma, and S. J. Moon, "An improvement on a three-party password-based key exchange protocol using weil pairing," International Journal of Network Security, vol. 11, no. 1, pp. 14-19, 2010.
-
(2010)
International Journal of Network Security
, vol.11
, Issue.1
, pp. 14-19
-
-
Yong, Z.1
Ma, J.F.2
Moon, S.J.3
|