共 25 条
- [1] [Anonymous], 2008, TRANSPORT LAYER SECU
- [2] Basin D, 2010, LECT NOTES COMPUT SC, V6345, P340, DOI 10.1007/978-3-642-15497-3_21
- [3] Blake-Wilson S, 1997, LECT NOTES COMPUT SC, V1355, P30, DOI 10.1007/BFb0024447
- [4] Boyd Colin., 2003, INF SECUR CRYTOGR
- [5] Chalkias K, 2007, SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, P222
- [6] Chalkias K, 2008, COMM COM INF SC, V23, P227
- [7] Cremers C, 2012, INFORM SECURITY CRYP
- [8] Cremers CJF, 2008, LECT NOTES COMPUT SC, V5123, P414
- [9] Key-compromise Impersonation Attacks on Some Certificateless Key Agreement Protocols and Two Improved Protocols [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 62 - 66
- [10] Gorantla MC, 2009, LECT NOTES COMPUT SC, V5443, P105