A Survey on Recently Proposed Key Exchange Protocols for Mobile Environment
暂无分享,去创建一个
[1] Erl-Huei Lu,et al. Secured key exchange protocol in wireless mobile ad hoc networks , 2005, Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology.
[2] Mihaela Cardei,et al. Routing Security in Ad Hoc Wireless Networks , 2010 .
[3] Dengguo Feng,et al. An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks , 2011, Comput. Commun..
[4] Zuowen Tan. An Enhanced Three-Party Authentication Key Exchange Protocol for Mobile Commerce Environments , 2010, J. Commun..
[5] Wei-Pang Yang,et al. A communication-efficient three-party password authenticated key exchange protocol , 2011, Inf. Sci..
[6] Hua Zhang,et al. Smart card-based authenticated key exchange protocol with CAPTCHA for wireless mobile network , 2010, 2010 2nd International Conference on Future Computer and Communication.
[7] Syed Taha Ali,et al. Eliminating Reconciliation Cost in Secret Key Generation for Body-Worn Health Monitoring Devices , 2014, IEEE Transactions on Mobile Computing.
[8] Yuh-Min Tseng,et al. An efficient user authentication and key exchange protocol for mobile client-server environment , 2010, Comput. Networks.
[9] Douglas Stebila,et al. Quantum Key Distribution in the Classical Authenticated Key Exchange Framework , 2012, PQCrypto.
[10] Lei Chen. Applications, Technologies, and Standards in Secure Wireless Networks and Communications , 2013 .
[11] Ruchuan Wang,et al. Novel Three-Party Password-Based Authenticated Key Exchange Protocol for Wireless Sensor Networks , 2012, CWSN.
[12] Massimo Merro,et al. A Calculus for the Analysis of Wireless Network Security Protocols , 2010, Formal Aspects in Security and Trust.
[13] Yijun He,et al. Towards a secure mutual authentication and key exchange protocol for mobile communications , 2008, 2008 6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks and Workshops.
[14] Hermann de Meer,et al. Dynamic key management in wireless sensor networks: A survey , 2013, J. Netw. Comput. Appl..
[15] Maryam Saeed,et al. Security analysis and improvement of Smart Card-Based Authenticated Key Exchange protocol with CAPTCHAs for wireless mobile network , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).
[16] Dawu Gu,et al. Provably secure three-party password-based authenticated key exchange protocol , 2012, Inf. Sci..
[17] Eric Gamess,et al. Analyzing Routing Protocol Performance with Nctuns for Vehicular Networks , 2014 .
[18] Ding-Zhu Du,et al. Wireless Network Security , 2009, EURASIP J. Wirel. Commun. Netw..