A SECURE AND EFFICIENT ECC-BASED AKA PROTOCOL FOR WIRELESS MOBILE COMMUNICATIONS
暂无分享,去创建一个
[1] Sarvar Patel,et al. Password-authenticated key exchange based on RSA , 2000, International Journal of Information Security.
[2] Peter Sweeney,et al. Simple authenticated key agreement algorithm , 1999 .
[3] Zhenfu Cao,et al. Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing , 2008, Int. J. Netw. Secur..
[4] Min-Shiang Hwang,et al. An Improvement of a Simple Authenticated Key Agreement Algorithm , 2002 .
[5] Siu-Ming Yiu,et al. An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[6] Min-Shiang Hwang,et al. Enhanced of Key Agreement Protocols Resistant to a Denial-of-Service Attack , 2004, Fundam. Informaticae.
[7] Taekyoung Kwon,et al. Practical Authenticated Key Agreement Using Passwords , 2004, ISC.
[8] David P. Jablon. Strong password-only authenticated key exchange , 1996, CCRV.
[9] Steven M. Bellovin,et al. Encrypted key exchange: password-based protocols secure against dictionary attacks , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[10] Chris J. Mitchell,et al. Key control in key agreement protocols , 1998 .
[11] Zhenfu Cao,et al. An enhanced authenticated key agreement protocol for wireless mobile communication , 2007, Comput. Stand. Interfaces.
[12] Wen-Shenq Juang,et al. Efficient User Authentication and Key Agreement with User Privacy Protection , 2008, Int. J. Netw. Secur..
[13] Wen Gao,et al. Elliptic Curve Cryptography Based Wireless Authentication Protocol , 2007, Int. J. Netw. Secur..
[14] Chin-Chen Chang,et al. An Improved Authentication Key Agreement Protocol Based on Elliptic Curve for Wireless Mobile Networks , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[15] Hong Chen,et al. EXPERIMENTAL STUDY ON SECURE COMMUNICATION OF DIFFERENT SCROLL CHAOTIC SYSTEMS WITH IDENTICAL STRUCTURE , 2008 .
[16] Cheng-Chi Lee,et al. A new key authentication scheme based on discrete logarithms , 2003, Appl. Math. Comput..
[17] Kunihiro Yamada,et al. THE HOME NETWORK SYSTEM BY MUTUAL COMPLEMENT OF WIRELESS AND WIRED COMMUNICATIONS , 2008 .