Exploration of Schemes for Authenticated Key Agreement Protocol Based on Elliptic Curve Cryptosystem
暂无分享,去创建一个
[1] He Chen,et al. A novel mutual authentication and key agreement protocol based on NTRU cryptography for wireless communications , 2005 .
[2] Tianhua Liu,et al. A Robust and Efficient Password-authenticated Key Agreement Scheme without Verification Table Based on Elliptic Curve Cryptosystem , 2010, 2010 International Conference on Computational Aspects of Social Networks.
[3] Bingwu Liu,et al. Research on Efficiency of Computing kP in Elliptic Curve System , 2010, 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM).
[4] P. Shah. Investigating effects of co-ordinate system on execution time of elliptical curve protocol in wireless sensor networks , 2012, 2012 International Conference on Future Communication Networks.
[5] Xun Yi,et al. Authenticated key agreement in dynamic peer groups , 2004, Theor. Comput. Sci..
[6] Moncef Amara,et al. Elliptic Curve Cryptography and its applications , 2011, International Workshop on Systems, Signal Processing and their Applications, WOSSPA.
[7] Jianhua Chen,et al. Weakness of two ID-based remote mutual authentication with key agreement protocols for mobile devices , 2010, IACR Cryptol. ePrint Arch..
[8] Eun-Jun Yoon,et al. A SECURE AND EFFICIENCY ID-BASED AUTHENTICATED KEY AGREEMENT SCHEME BASED ON ELLIPTIC CURVE CRYPTOSYSTEM FOR MOBILE DEVICES , 2012 .
[9] Miguel Morales-Sandoval,et al. Elliptic curve cryptography on Windows CE devices , 2012, CONIELECOMP 2012, 22nd International Conference on Electrical Communications and Computers.
[10] Siham Ezzouak,et al. Improving Pollard's Rho attack on elliptic curve cryptosystems , 2012, 2012 International Conference on Multimedia Computing and Systems.
[11] Minh-Triet Tran,et al. Improvement of the More Efficient and Secure ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on ECC , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.
[12] G. P. Biswas,et al. A pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks , 2012, Ann. des Télécommunications.
[13] Bernd Freisleben,et al. Managing Behaviour Trust in Grids Using Statistical Methods of Quality Assurance , 2007 .
[14] Alfred Menezes,et al. Key Agreement Protocols and Their Security Analysis , 1997, IMACC.
[15] Liu Zhi-meng. An elliptic curve cryptography based on authentication and key agreement protocol for wireless communication , 2008 .
[16] Suhas N. Diggavi,et al. Group secret key agreement over state-dependent wireless broadcast channels , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.
[17] Xia Lin. The application of Elliptic Curve Cryptography in Electronic Commerce , 2012, 2012 IEEE Symposium on Electrical & Electronics Engineering (EEESYM).
[18] Wei Yuan,et al. Improvement of an Efficient Identity-Based Group Key Agreement Protocol , 2011, 2011 International Conference on Network Computing and Information Security.
[19] V. Vijayalakshmi,et al. Effective Key Establishment and Authentication Protocol for Wireless Sensor Networks Using Elliptic Curve ... 1 Effective Key Establishment and Authentication Protocol for Wireless Sensor Networks Using Elliptic Curve Cryptography , 2008 .
[20] B. Maheshwari. SECURE KEY AGREEMENT AND AUTHENTICATION PROTOCOLS , 2012 .
[21] Rakesh Chandra Gangwar. SECURE AND EFFICIENT DECENTRALIZED GROUP KEY ESTABLISHMENT PROTOCOL FOR ROBUST GROUP COMMUNICATION , 2008 .
[22] Bachar El-Hassan,et al. A Secure Authenticated Key Agreement Protocol Based on Elliptic Curve Cryptography , 2007, Third International Symposium on Information Assurance and Security.