共 50 条
- [1] A delayed commitment scheme to enhance public key certificate based protocols [J]. IEEE 9TH INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2000, : 181 - 182
- [2] ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) : 198 - 208
- [3] Security Verification for Authentication and Key Exchange Protocols [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (03): : 1 - 11
- [4] Security Verification for Authentication and Key Exchange Protocols [J]. 2008 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, VOLS 1-3, 2008, : 507 - 512
- [5] Symmetric Key-Based Lightweight Authentication Protocols for RFID Security [J]. 2018 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2018, : 488 - 495
- [6] AMI Authentication Method based on Hardware Public Key Certificate using Unique Identifier [J]. 2015 INTERNATIONAL SOC DESIGN CONFERENCE (ISOCC), 2015, : 341 - 342
- [9] Questioning the Security of Three Recent Authentication and Key Agreement Protocols [J]. IEEE ACCESS, 2021, 9 : 98204 - 98217
- [10] A machine learning-based scheme for the security analysis of authentication and key agreement protocols [J]. Neural Computing and Applications, 2020, 32 : 16819 - 16831