共 50 条
- [1] Cryptanalysis of a Three-party Authenticated Key Exchange Protocol Using Elliptic Curve Cryptography [J]. 2009 INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN COMPUTER SCIENCE, ICRCCS 2009, 2009, : 7 - 10
- [2] PROVABLY SECURE HIGH ENTROPY THREE-PARTY AUTHENTICATED KEY EXCHANGE SCHEME FOR NETWORK ENVIRONMENTS [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (10): : 5619 - 5630
- [3] A new secure three-party authenticated key exchange protocol [J]. Int. Rev. Comput. Softw, 7 (3633-3638):
- [5] A Secure Three-Party Authenticated Key Exchange Protocol for Social Networks [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 71 (03): : 6293 - 6305
- [7] A PRACTICAL THREE-PARTY AUTHENTICATED KEY EXCHANGE PROTOCOL [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2010, 6 (06): : 2469 - 2483
- [9] Efficient and secure three-party authenticated key exchange protocol for mobile environments [J]. Journal of Zhejiang University SCIENCE C, 2013, 14 : 347 - 355
- [10] Efficient and secure three-party authenticated key exchange protocol for mobile environments [J]. JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2013, 14 (05): : 347 - 355