共 50 条
- [42] Authenticated Key Exchange Protocols Based on Factoring Assumption PROVABLE SECURITY, 7TH INTERNATIONAL CONFERENCE, PROVSEC 2013, 2013, 8209 : 21 - 37
- [43] Composability of Bellare-Rogaway Key Exchange Protocols PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 51 - 61
- [44] Computational Soundness for Key Exchange Protocols with Symmetric Encryption CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 91 - 100
- [45] Security of Group Key Exchange Protocols with Different Passwords 2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS: WAINA, VOLS 1 AND 2, 2009, : 147 - 152
- [46] Analyzing the security flaws of internet key exchange protocols Ruan Jian Xue Bao/Journal of Software, 2002, 13 (06): : 1173 - 1177
- [47] Automatic Generation of Optimal Quantum Key Distribution Protocols PROCEEDINGS OF THE 2017 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE (GECCO'17), 2017, : 1153 - 1160
- [48] Efficient authenticators with application to key exchange INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2005, 2006, 3935 : 81 - 91
- [49] How to Construct Secure and Efficient Three-Party Password-Based Authenticated Key Exchange Protocols INFORMATION SECURITY AND CRYPTOLOGY, 2011, 6584 : 218 - +
- [50] Formal design of efficient authentication and key agreement protocols SECURE INFORMATION NETWORKS: COMMUNICATIONS AND MULTIMEDIA SECURITY, 1999, 23 : 96 - 113