共 50 条
- [1] On security models and compilers for group key exchange protocols (Extended abstract) [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2007, 4752 : 292 - +
- [2] Security analysis and applications of standard key agreement protocols [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2003, PT 2, PROCEEDINGS, 2003, 2668 : 191 - 200
- [3] Analysis on Security Proof of Two Key Agreement Protocols [J]. NEW TRENDS AND APPLICATIONS OF COMPUTER-AIDED MATERIAL AND ENGINEERING, 2011, 186 : 531 - +
- [4] Security analysis on tripartite authenticated key agreement protocols [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4653 - +
- [5] Analysis of security requirements for cryptographic voting protocols (extended abstract) [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 1451 - 1456
- [6] Security analysis of password-authenticated key agreement protocols [J]. CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3810 : 49 - 58
- [8] Modular security proofs for key agreement protocols [J]. ADVANCES IN CRYPTOLOGY ASIACRYPT 2005, 2005, 3788 : 549 - 565
- [9] ON THE SECURITY OF AUTHENTICATED GROUP KEY AGREEMENT PROTOCOLS [J]. SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2019, 20 (01): : 93 - 99
- [10] Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2009, 2009, 5580 : 235 - 253