共 8 条
- [3] Non-Interactive Authenticated Key Agreement over the Mobile Communication Network[J] . Tzong-Sun Wu,Han-Yu Lin.Mobile Networks and Applications . 2013 (5)
- [4] Signal-flow-based analysis of wireless security protocols[J] . ?a?atay,?apar,Dennis Goeckel,Kenneth G. Paterson,Elizabeth A. Quaglia,Don Towsley,Murtaza Zafer.Information and Computation . 2013
- [5] Public key distribution scheme for delay tolerant networks based on two-channel cryptography[J] . Zhongtian Jia,Xiaodong Lin,Seng-Hua Tan,Lixiang Li,Yixian Yang.Journal of Network and Computer Applications . 2011 (3)
- [7] On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups[J] . Kenneth G. Paterson,Sriramkrishnan Srinivasan.Designs, Codes and Cryptography . 2009 (2)
- [8] Provably secure non-interactive key distribution based on pairings[J] . Régis Dupont,Andreas Enge.Discrete Applied Mathematics . 2005 (2)