共 50 条
- [1] Key-compromise Impersonation Attacks on Some Certificateless Key Agreement Protocols and Two Improved Protocols PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 62 - 66
- [3] Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols PUBLIC KEY CRYPTOGRAPHY-PKC 2009, PROCEEDINGS, 2009, 5443 : 105 - 123
- [4] On the key-compromise impersonation vulnerability of one-pass key establishment protocols SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 222 - 228
- [5] Impersonation attacks on key agreement Protocols resistant to denial of service attacks IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2006, E89D (07): : 2306 - 2309
- [6] Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols E-BUSINESS AND TELECOMMUNICATIONS, 2008, 23 : 227 - 238