共 50 条
- [4] Analyzing the security flaws of internet key exchange protocols [J]. Ruan Jian Xue Bao/Journal of Software, 2002, 13 (06): : 1173 - 1177
- [5] On the design of security protocols for mobile communications [J]. INFORMATION SECURITY AND PRIVACY: 1ST AUSTRALASIAN CONFERENCE, ACISP 96, 1996, 1172 : 134 - 145
- [6] Security Verification for Authentication and Key Exchange Protocols [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (03): : 1 - 11
- [7] Security Verification for Authentication and Key Exchange Protocols [J]. 2008 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, VOLS 1-3, 2008, : 507 - 512
- [8] Accelerating key establishment protocols for mobile communication [J]. INFORMATION SECURITY AND PRIVACY, 1999, 1587 : 51 - 63
- [9] Security of public key certificate based authentication protocols [J]. PUBLIC KEY CRYTOGRAPHY, 2000, 1751 : 196 - 209
- [10] Addressing Flaws in RFID Authentication Protocols [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2011, 2011, 7107 : 216 - +