共 50 条
- [2] Key establishment using secure distance bounding protocols [J]. 2007 FOURTH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2007, : 516 - 521
- [3] Secure deniable authenticated key establishment for Internet Protocols [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 3 - +
- [4] Accelerating key establishment protocols for mobile communication [J]. INFORMATION SECURITY AND PRIVACY, 1999, 1587 : 51 - 63
- [5] On session key construction in provably-secure key establishment protocols [J]. PROGRESS IN CRYPTOLOGY - MYCRYPT 2005, 2005, 3715 : 116 - 131
- [6] Secure key distribution protocol in mobile communications [J]. WMSCI 2006: 10TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS, 2006, : 152 - 155
- [7] Secure Key Establishment for Device-to-Device Communications [J]. 2014 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2014), 2014, : 336 - 340
- [9] Design of secure key establishment protocols: Successes, failures and prospects [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2004, PROCEEDINGS, 2004, 3348 : 1 - 13