共 38 条
[1]
Chen TH(2008)A round-and computation-efficient three-party authenticated key exchange protocol J Syst Softw 81 1581-1590
[2]
Lee WB(1976)New directions in cryptography IEEE Trans Inf Theory IT-22(6) 644-654
[3]
Chen HB(2008)Cryptanalysis of simple three party key exchange protocol Comput Secur 27 16-21
[4]
Diffie W(2011)An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security Inf Fusion 13 223-230
[5]
Hellman M(2010)Two proposed identity-based three-party authenticated key agreement protocols from pairings Comput Secur 29 244-252
[6]
Guo H(2011)A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem J Syst Softw 84 1892-1898
[7]
Li Z(2001)An unknown key-share attack on the MQV key agreement protocol ACM Trans Inf Syst Secur 4 275-288
[8]
Mu Y(1987)Elliptic curve cryptosystem Math Comput 48 203-209
[9]
Zhang X(2008)On security of a practical three-party key exchange protocol with round efficiency Inf Technol Control 37 333-335
[10]
He D(2005)Efficient verifier-based key agreement protocol for three parties without server’s public key Appl Math Comput 167 996-1003