共 50 条
- [21] Deniable authenticated key establishment for Internet protocols SECURITY PROTOCOLS, 2005, 3364 : 255 - 273
- [22] Analysis of the Internet key exchange protocol and its amendment based on public key signatures Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2003, 31 (10):
- [23] Modelling Time for Authenticated Key Exchange Protocols COMPUTER SECURITY - ESORICS 2014, PT II, 2014, 8713 : 277 - 294
- [24] Security Verification for Authentication and Key Exchange Protocols INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (03): : 1 - 11
- [25] Downgrade Resilience in Key-Exchange Protocols 2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2016, : 506 - 525
- [27] Key exchange protocols for multiparty communication services Hosei University (Institute of Electrical and Electronics Engineers Inc., United States):
- [28] Key exchange protocols for multiparty communication services FIRST INTERNATIONAL SYMPOSIUM ON CYBER WORLDS, PROCEEDINGS, 2002, : 241 - 248
- [29] Scalable Protocols for Authenticated Group Key Exchange Journal of Cryptology, 2007, 20 : 85 - 113