-
4
-
-
74149086367
-
Two proposed identity-based three-party authenticated key agreement protocols from pairings
-
Hölbl M., Welzer T., Brumen B: Two proposed identity-based three-party authenticated key agreement protocols from pairings. Comput. Secur. 29, 244-252 (2010).
-
(2010)
Comput. Secur.
, vol.29
, pp. 244-252
-
-
Hölbl, M.1
Welzer, T.2
Brumen, B.3
-
5
-
-
8344221264
-
Enhanced three-party encrypted key exchange without server public keys
-
Lee T. F., Hwang T., Lin C. L: Enhanced three-party encrypted key exchange without server public keys. Comput. Secur. 23(6), 571-577 (2004).
-
(2004)
Comput. Secur.
, vol.23
, Issue.6
, pp. 571-577
-
-
Lee, T.F.1
Hwang, T.2
Lin, C.L.3
-
6
-
-
25144525619
-
Efficient verifier-based key agreement protocol for three parties without server's public key
-
Lee S. W., Kim H. S., Yoo K. Y: Efficient verifier-based key agreement protocol for three parties without server's public key. Appl. Math. Comput. 167(2), 996-1003 (2005).
-
(2005)
Appl. Math. Comput.
, vol.167
, Issue.2
, pp. 996-1003
-
-
Lee, S.W.1
Kim, H.S.2
Yoo, K.Y.3
-
7
-
-
0008145442
-
Three-party encrypted key exchange: attacks and a solution
-
Lin C. L., Sun H. M., Hwang T: Three-party encrypted key exchange: attacks and a solution. ACM Oper. Syst. Rev. 34, 12-20 (2000).
-
(2000)
ACM Oper. Syst. Rev.
, vol.34
, pp. 12-20
-
-
Lin, C.L.1
Sun, H.M.2
Hwang, T.3
-
8
-
-
9544230689
-
Secure key agreement protocols for three-party against guessing attacks
-
Sun H. M., Chen B. C., Hwang T: Secure key agreement protocols for three-party against guessing attacks. J. Syst. Softw. 75, 63-68 (2005).
-
(2005)
J. Syst. Softw.
, vol.75
, pp. 63-68
-
-
Sun, H.M.1
Chen, B.C.2
Hwang, T.3
-
9
-
-
47549109760
-
A round-and computation-efficient three-party authenticated key exchange protocol
-
Chen T. H., Lee W. B., Chen H. B: A round-and computation-efficient three-party authenticated key exchange protocol. J. Syst. Softw. 81, 1581-1590 (2008).
-
(2008)
J. Syst. Softw.
, vol.81
, pp. 1581-1590
-
-
Chen, T.H.1
Lee, W.B.2
Chen, H.B.3
-
10
-
-
0000537828
-
Efficient identification and signature for smart cards
-
Schnorr, C. P.: Efficient identification and signature for smart cards. In: Proceedings of CRYPTO'89, 239-252 (1989).
-
(1989)
Proceedings of CRYPTO'89
, pp. 239-252
-
-
Schnorr, C.P.1
-
11
-
-
68949161753
-
An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments
-
Yang J.-H., Chin-Chen C: An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments. J. Syst. Softw. 82, 1497-1520 (2009).
-
(2009)
J. Syst. Softw.
, vol.82
, pp. 1497-1520
-
-
Yang, J.-H.1
Chin-Chen, C.2
-
12
-
-
85015402934
-
-
In: Advances in cryptology. Proceedings of CRYPTO'85
-
Miller, V. S.: Use of elliptic curves in cryptography. In: Advances in cryptology. Proceedings of CRYPTO'85, 417-26 (1986).
-
(1986)
Use of elliptic curves in cryptography
, pp. 417-426
-
-
Miller, V.S.1
-
13
-
-
0000112683
-
Elliptic curve cryptosystem
-
Koblitz N: Elliptic curve cryptosystem. Math. Comput. 48, 203-209 (1987).
-
(1987)
Math. Comput.
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
15
-
-
78651538975
-
An enhanced three-party authentication key exchange protocol for mobile commerce environments
-
Tan Z: An enhanced three-party authentication key exchange protocol for mobile commerce environments. J. Commun. 5(4), 436-443 (2010).
-
(2010)
J. Commun.
, vol.5
, Issue.4
, pp. 436-443
-
-
Tan, Z.1
-
16
-
-
79955722723
-
Security weaknesses of authenticated key agreement protocols
-
doi: 10. 1016/j. ipl. 2011. 04. 007
-
Nose, P.: Security weaknesses of authenticated key agreement protocols. Inf. Process. Lett. doi: 10. 1016/j. ipl. 2011. 04. 007 (2011).
-
(2011)
Inf. Process. Lett
-
-
Nose, P.1
-
17
-
-
78650405278
-
Smart card-based secure web services in the three-party setting
-
Wang R., Juang W., Lei C: Smart card-based secure web services in the three-party setting. Int. J. Innov. Comput. Inf. Control. 6(11), 5259-5274 (2010).
-
(2010)
Int. J. Innov. Comput. Inf. Control.
, vol.6
, Issue.11
, pp. 5259-5274
-
-
Wang, R.1
Juang, W.2
Lei, C.3
-
18
-
-
77953893048
-
An efficient three-party authenticated key exchange protocol with one-time key
-
Lv, C.; Ma, M.; Li, H.; Ma, J.: An efficient three-party authenticated key exchange protocol with one-time key. Proceedings of IEEE INFOCOM 2010, 1-5 (2010).
-
(2010)
Proceedings of IEEE INFOCOM 2010
, pp. 1-5
-
-
Lv, C.1
Ma, M.2
Li, H.3
Ma, J.4
-
19
-
-
79952645251
-
Robust biometric-based three-party authenticated key establishment protocols
-
Yoon E., Yoo K: Robust biometric-based three-party authenticated key establishment protocols. Int. J. Comput. Math. 88(5), 1144-1157 (2011).
-
(2011)
Int. J. Comput. Math.
, vol.88
, Issue.5
, pp. 1144-1157
-
-
Yoon, E.1
Yoo, K.2
-
20
-
-
79953330802
-
Efficient three-party password-based key exchange scheme
-
Lou D., Huang H: Efficient three-party password-based key exchange scheme. Int. J. Commun. Syst. 24, 504-512 (2011).
-
(2011)
Int. J. Commun. Syst.
, vol.24
, pp. 504-512
-
-
Lou, D.1
Huang, H.2
-
21
-
-
85020598353
-
Identity based cryptosystems and signature protocols
-
Shamir, A.: Identity based cryptosystems and signature protocols. In: Proceedings of CRYPTO' 84, 47-53 (1984).
-
(1984)
Proceedings of CRYPTO' 84
, pp. 47-53
-
-
Shamir, A.1
-
23
-
-
77955431593
-
A secure and efficient SIP authentication scheme for converged VoIP networks
-
Yoon, E. J.; Yoo, K. Y.; Kim, W. H.: A secure and efficient SIP authentication scheme for converged VoIP networks. Comput. Commun. 33, 1674-1681 (2010).
-
(2010)
Comput. Commun
, vol.33
, pp. 1674-1681
-
-
Yoon, E.J.1
Yoo, K.Y.2
Kim, W.H.3
|