共 50 条
- [3] Weaknesses of a Verifier-based Password-authenticated Key Exchange Protocol in the Three-party Setting 2009 INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN COMPUTER SCIENCE, ICRCCS 2009, 2009, : 3 - 6
- [6] ECC-Based Password-Authenticated Key Exchange in the Three-Party Setting ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2013, 38 (08): : 2069 - 2077
- [7] ECC-Based Password-Authenticated Key Exchange in the Three-Party Setting Arabian Journal for Science and Engineering, 2013, 38 : 2069 - 2077
- [8] A Provably-Secure and Efficient Verifier-Based Anonymous Password-Authenticated Key Exchange Protocol 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 670 - 677
- [9] THREE-PARTY PASSWORD-AUTHENTICATED KEY EXCHANGE WITHOUT RANDOM ORACLES SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2011, : 15 - 24