共 50 条
- [33] Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols PUBLIC KEY CRYPTOGRAPHY-PKC 2009, PROCEEDINGS, 2009, 5443 : 105 - 123
- [34] A class of flexible and efficient key management protocols 9TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1996, : 2 - 8
- [35] Count Corruptions, Not Users: Improved Tightness for Signatures, Encryption and Authenticated Key Exchange ADVANCES IN CRYPTOLOGY - ASIACRYPT 2024, PT II, 2025, 15485 : 326 - 360
- [36] Fast and Automatic Verification of Authentication and Key Exchange Protocols INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (04): : 1 - 13
- [38] Certificateless and Identity based Authenticated Key Exchange Protocols E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2014, 2015, 554 : 255 - 277
- [39] Fast and Automatic Verification of Authentication and Key Exchange Protocols PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN P2P SYSTEMS (AP2PS 2010), 2010, : 7 - 13
- [40] Enhanced authentication and key exchange protocols for roaming service Tongxin Xuebao/Journal on Communications, 2009, 30 (11 A): : 61 - 68