共 50 条
- [3] Provably secure authenticated key agreement protocol based on hierarchical identity [J]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2014, 36 (12): : 2848 - 2854
- [4] An Improved Provably Secure Identity-Based Authenticated Key Agreement Protocol [J]. 2014 INTERNATIONAL CONFERENCE ON MANAGEMENT OF E-COMMERCE AND E-GOVERNMENT (ICMECG), 2014, : 98 - 103
- [5] MAKA: Provably Secure Multi-factor Authenticated Key Agreement Protocol [J]. JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (03): : 669 - 677
- [6] A Provably Secure Authenticated Key Exchange Protocol [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 292 - 297
- [7] A secure authenticated key agreement protocol [J]. MELECON 2004: PROCEEDINGS OF THE 12TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE, VOLS 1-3, 2004, : 783 - 786
- [8] PROVABLY SECURE IDENTITY-BASED AUTHENTICATED KEY AGREEMENT PROTOCOL AND ITS APPLICATION [J]. 2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 1240 - 1244
- [9] Provably secure and password-authenticated quantum key agreement protocol with dynamic basis [J]. Journal of Information Hiding and Multimedia Signal Processing, 2018, 9 (03): : 651 - 660