共 50 条
- [1] Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2009, 2009, 5580 : 235 - 253
- [2] Key agreement protocols and their security analysis (Extended abstract) [J]. CRYPTOGRAPHY AND CODING, PROCEEDINGS, 1997, 1355 : 30 - 45
- [3] Analysis on Security Proof of Two Key Agreement Protocols [J]. NEW TRENDS AND APPLICATIONS OF COMPUTER-AIDED MATERIAL AND ENGINEERING, 2011, 186 : 531 - +
- [4] Security analysis on tripartite authenticated key agreement protocols [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4653 - +
- [5] Security analysis of password-authenticated key agreement protocols [J]. CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3810 : 49 - 58
- [7] Modular security proofs for key agreement protocols [J]. ADVANCES IN CRYPTOLOGY ASIACRYPT 2005, 2005, 3788 : 549 - 565
- [8] ON THE SECURITY OF AUTHENTICATED GROUP KEY AGREEMENT PROTOCOLS [J]. SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2019, 20 (01): : 93 - 99
- [9] Security of authenticated multiple-key agreement protocols [J]. ELECTRONICS LETTERS, 1999, 35 (05) : 391 - 392
- [10] Security properties of two authenticated conference key agreement protocols [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2005, 3783 : 304 - 314