共 50 条
- [2] Secure verifier-based three-party password-authenticated key exchange [J]. Peer-to-Peer Networking and Applications, 2013, 6 : 15 - 25
- [3] Weaknesses of a Verifier-based Password-authenticated Key Exchange Protocol in the Three-party Setting [J]. 2009 INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN COMPUTER SCIENCE, ICRCCS 2009, 2009, : 3 - 6
- [4] Verifier-Based Three-Party Password-Authenticated Key Exchange with Forward Security [J]. ICCEE 2008: PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, 2008, : 56 - 61
- [5] Improved Verifier-based Three-party Password-authenticated Key Exchange Protocol [J]. Ruan Jian Xue Bao/Journal of Software, 2020, 31 (10): : 3238 - 3250
- [8] ECC-Based Password-Authenticated Key Exchange in the Three-Party Setting [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2013, 38 (08): : 2069 - 2077
- [9] Post-quantum verifier-based three-party password authenticated key exchange protocol [J]. Tongxin Xuebao/Journal on Communications, 2022, 43 (04): : 95 - 106
- [10] ECC-Based Password-Authenticated Key Exchange in the Three-Party Setting [J]. Arabian Journal for Science and Engineering, 2013, 38 : 2069 - 2077