A PARALLEL PASSWORD-AUTHENTICATED KEY EXCHANGE PROTOCOL FOR WIRELESS ENVIRONMENTS
暂无分享,去创建一个
[1] Kazukuni Kobara,et al. Pretty-Simple Password-Authenticated Key-Exchange Protocol Proven to be Secure in the Standard Model , 2002, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[2] Min-Shiang Hwang,et al. An Improvement of a Simple Authenticated Key Agreement Algorithm , 2002 .
[3] Chou Chen Yang,et al. Improvement on Pretty-Simple Password Authenticated Key-Exchange Protocol for Wireless Networks , 2004, Informatica.
[4] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[5] Mihir Bellare,et al. Authenticated Key Exchange Secure against Dictionary Attacks , 2000, EUROCRYPT.
[6] Min-Shiang Hwang,et al. Enhanced of Key Agreement Protocols Resistant to a Denial-of-Service Attack , 2004, Fundam. Informaticae.
[7] Yehuda Lindell,et al. Session-Key Generation Using Human Passwords Only , 2001, Journal of Cryptology.
[8] Siu-Ming Yiu,et al. An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[9] Chris J. Mitchell,et al. Key control in key agreement protocols , 1998 .
[10] Min-Shiang Hwang,et al. A new anonymous conference key distribution system based on the elliptic curve discrete logarithm problem , 2003, Comput. Stand. Interfaces.
[11] S.A Vanstone. Next generation security for wireless: elliptic curve cryptography , 2003, Comput. Secur..
[12] Wen-Shenq Juang,et al. Efficient User Authentication and Key Agreement with User Privacy Protection , 2008, Int. J. Netw. Secur..
[13] 김기천,et al. [서평]「Computer Networks and Internets」 , 1999 .
[14] Ding Yong,et al. Speeding Scalar Multiplication of Elliptic Curve over GF(2mn) , 2010, Int. J. Netw. Secur..
[15] Tzu-Chun Lin. Algorithms on Elliptic Curves over Fields of Characteristic Two with Non-adjacent Forms , 2009, Int. J. Netw. Secur..
[16] Rafail Ostrovsky,et al. Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords , 2001, EUROCRYPT.
[17] Steven M. Bellovin,et al. Encrypted key exchange: password-based protocols secure against dictionary attacks , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.