共 50 条
- [2] Key-compromise Impersonation Attacks on Some Certificateless Key Agreement Protocols and Two Improved Protocols PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 62 - 66
- [3] On the resilience of key agreement protocols to key compromise impersonation PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS, 2006, 4043 : 233 - 247
- [4] Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols E-BUSINESS AND TELECOMMUNICATIONS, 2008, 23 : 227 - 238
- [7] An enhanced key exchange protocol exhibiting key compromise impersonation attacks resistance in mobile commerce environment Science China Information Sciences, 2021, 64
- [8] On the key-compromise impersonation vulnerability of one-pass key establishment protocols SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 222 - 228
- [9] Impersonation attacks on key agreement Protocols resistant to denial of service attacks IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2006, E89D (07): : 2306 - 2309
- [10] Outsider Key Compromise Impersonation Attack on a Multi-factor Authenticated Key Exchange Protocol APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2022, 2022, 13285 : 320 - 337