共 50 条
- [32] Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols PUBLIC KEY CRYPTOGRAPHY-PKC 2009, PROCEEDINGS, 2009, 5443 : 105 - 123
- [33] Group Secret Key Generation in Physical Layer, Protocols and Achievable Rates 2017 17TH INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES (ISCIT), 2017,
- [36] Secret Key Amplification from Uniformly Leaked Key Exchange Complete Graph WALCOM: ALGORITHMS AND COMPUTATION, WALCOM 2018, 2018, 10755 : 20 - 31
- [37] Fast and Automatic Verification of Authentication and Key Exchange Protocols INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (04): : 1 - 13
- [39] Certificateless and Identity based Authenticated Key Exchange Protocols E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2014, 2015, 554 : 255 - 277
- [40] Fast and Automatic Verification of Authentication and Key Exchange Protocols PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN P2P SYSTEMS (AP2PS 2010), 2010, : 7 - 13