-
1
-
-
0026850091
-
Encrypted key exchange: Passwords based protocols secure against dictionary attacks
-
New Jersey, USA, IEEE
-
S. Bellovin and M. Merritt, Encrypted key exchange: Passwords based protocols secure against dictionary attacks, Proceedings of the IEEE Symposium on Security and Privacy, New Jersey, USA, IEEE (1992), pp. 72-84.
-
(1992)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 72-84
-
-
Bellovin, S.1
Merritt, M.2
-
2
-
-
84945119254
-
Entity authentication and key distribution
-
M. Bellare and P. Rogaway, Entity authentication and key distribution, Advances in Cryptology-Crypto'93, LNCS (1993), Vol. 773, pp. 232-249.
-
(1993)
Advances in Cryptology-Crypto'93, LNCS
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
3
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
M. Bellare, D. Pointcheval, and P. Rogaway, Authenticated key exchange secure against dictionary attacks, Advances in Cryptology- Eurocrypt'00, LNCS (2000), Vol. 1807, pp. 139-155.
-
(2000)
Advances in Cryptology- Eurocrypt'00, LNCS
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
4
-
-
0001940580
-
Provably secure session key distribution: The three party case
-
New York, USA, ACM
-
M. Bellare and P. Rogaway, Provably secure session key distribution: The three party case, Proceedings of the ACM Symposium on the Theory of Computing (STOC'95), New York, USA, ACM (1995), pp. 57-66.
-
(1995)
Proceedings of the ACM Symposium on the Theory of Computing (STOC'95
, pp. 57-66
-
-
Bellare, M.1
Rogaway, P.2
-
6
-
-
44849118543
-
-
H. Guo, Z. Li, Y. Mu, and X. Zhang, Computers and Security 27, 16 (2008).
-
(2008)
Computers and Security
, vol.27
, pp. 16
-
-
Guo, H.1
Li, Z.2
Mu, Y.3
Zhang, X.4
-
14
-
-
0035701459
-
-
C.-L. Lin, H.-M. Sun, M. Steiner, and T. Hwang, IEEE Communication Letter 5, 497 (2001).
-
(2001)
IEEE Communication Letter
, vol.5
, pp. 497
-
-
Lin, C.-L.1
Sun, H.-M.2
Steiner, M.3
Hwang, T.4
-
17
-
-
0000537828
-
Efficient identification and signature for smart cards
-
Springer Berlin Heidelberg, Germany, Springer-Verlag
-
C. P. Schnorr, Efficient identification and signature for smart cards, Proceedings of CRYPTO'89, LNCS, Springer Berlin Heidelberg, Germany, Springer-Verlag (1989), pp. 239-252.
-
(1989)
Proceedings of CRYPTO'89, LNCS
, pp. 239-252
-
-
Schnorr, C.P.1
-
20
-
-
41549147733
-
Security analysis on nalla-reddy's id-based tripartite authenticated key agreement protocols
-
Chen Z. Security analysis on Nalla-Reddy's ID-based tripartite authenticated key agreement protocols, Cryptology Eprint Archive (2003), Vol. 103, No. 2, pp. 1-4.
-
(2003)
Cryptology Eprint Archive
, vol.103
, Issue.2
, pp. 1-4
-
-
Chen, Z.1
-
22
-
-
78651538975
-
-
Z. Tan, J. Commun. 5, 436 (2010).
-
J. Commun.
, vol.5
, Issue.436
, pp. 2010
-
-
Tan, Z.1
-
24
-
-
79956037223
-
Strongly secure certificateless key exchange without pairing
-
New York, USA, ACM
-
G. Yang and C. Tan, Strongly secure certificateless key exchange without pairing, 6th ACM Symposium on Information, Computer and Communications Security, New York, USA, ACM (2011) pp. 71-79.
-
6th ACM Symposium on Information, Computer and Communications Security
, vol.2011
, pp. 71-79
-
-
Yang, G.1
Tan, C.2
|