共 50 条
- [1] ECC-Based Password-Authenticated Key Exchange in the Three-Party Setting [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2013, 38 (08): : 2069 - 2077
- [2] Practical Password-Authenticated Three-Party Key Exchange [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2008, 2 (06): : 312 - 332
- [5] Weaknesses of a Verifier-based Password-authenticated Key Exchange Protocol in the Three-party Setting [J]. 2009 INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN COMPUTER SCIENCE, ICRCCS 2009, 2009, : 3 - 6
- [7] Secure verifier-based three-party password-authenticated key exchange [J]. Peer-to-Peer Networking and Applications, 2013, 6 : 15 - 25
- [8] Password-based authenticated key exchange in the three-party setting [J]. IEE Proceedings: Information Security, 2006, 153 (01): : 27 - 39
- [9] Password-based authenticated key exchange in the three-party setting [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2005, 2005, 3386 : 65 - 84