共 206 条
- [1] Tomar A(2019)An ECC based secure authentication and key exchange scheme in multi-server environment Wireless Pers. Commun. 107 351-372
- [2] Dhar J(2020)Secure two-factor authentication protocol using self-certified public key cryptography for multi-server 5G networks J. Netw. Comput. Appl. 161 102660-208
- [3] Haq IU(1983)On the security of public key protocols IEEE Trans. Inf. Theory 29 198-715
- [4] Wang J(1949)Communication theory of secrecy systems Bell Syst. Tech. J. 28 656-654
- [5] Zhu Y(1976)New directions in cryptography IEEE Trans. Inf. Theory 22 644-209
- [6] Dolev D(1987)Elliptic curve cryptosystems Math. Comput. 48 203-426
- [7] Yao AC(1985)Use of elliptic curves in cryptography Crypto Lect. Notes Comput. Sci. 85 417-150261
- [8] Shannon C(2019)Fog-orchestrated and server-controlled anonymous group authentication and key agreement IEEE Access 7 150247-1509
- [9] Diffie W(1997)Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer SIAM J. Comput. 26 1484-146
- [10] Hellman ME(2020)An elliptic curve cryptography based enhanced anonymous authentication protocol for wearable health monitoring systems Int. J. Inf. Secur. 19 129-249