共 50 条
- [5] A framework for design of key establishment protocols [J]. INFORMATION SECURITY AND PRIVACY: 1ST AUSTRALASIAN CONFERENCE, ACISP 96, 1996, 1172 : 146 - 157
- [7] Deriving secrecy in key establishment protocols [J]. COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 384 - 403
- [8] Token-based authenticated key establishment protocols for three-party communication [J]. EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, 4809 : 758 - +
- [10] A Chronological Review of Key Establishment Models and Protocols [J]. MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES, 2021, 15 : 39 - 61