ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Robust Authenticated Key Exchange Using Passwords and Identity-Based Signatures
Security Standardisation Research - Lecture Notes in Computer Science
◽
10.1007/978-3-319-27152-1_3
◽
2015
◽
pp. 43-69
◽
Cited By ~ 1
Author(s):
Jung Yeon Hwang
◽
Seung-Hyun Kim
◽
Daeseon Choi
◽
Seung-Hun Jin
◽
Boyeon Song
Keyword(s):
Key Exchange
◽
Authenticated Key Exchange
◽
Identity Based
Download Full-text
Related Documents
Cited By
References
A Three-Party Dynamic Identity-Based Authenticated Key Exchange Protocol with Forward Anonymity
Wireless Personal Communications
◽
10.1007/s11277-019-06659-6
◽
2019
◽
Vol 109
(3)
◽
pp. 1911-1924
Author(s):
Hongfeng Zhu
◽
Shuai Geng
Keyword(s):
Key Exchange
◽
Authenticated Key Exchange
◽
Key Exchange Protocol
◽
Identity Based
◽
Dynamic Identity
◽
Authenticated Key Exchange Protocol
Download Full-text
Impersonation Attack on Two Identity-Based Authenticated Key Exchange Protocols
2010 WASE International Conference on Information Engineering
◽
10.1109/icie.2010.122
◽
2010
◽
Cited By ~ 3
Author(s):
Shiwu Zhang
◽
Qingfeng Cheng
◽
Xuekui Wang
Keyword(s):
Key Exchange
◽
Impersonation Attack
◽
Authenticated Key Exchange
◽
Key Exchange Protocols
◽
Identity Based
Download Full-text
Server-Controlled Identity-Based Authenticated Key Exchange
Provable Security - Lecture Notes in Computer Science
◽
10.1007/978-3-642-04642-1_18
◽
2009
◽
pp. 214-229
Author(s):
Hua Guo
◽
Yi Mu
◽
Xiyong Zhang
◽
Zhoujun Li
Keyword(s):
Key Exchange
◽
Authenticated Key Exchange
◽
Identity Based
Download Full-text
Identity-based authenticated key exchange protocols from the Tate pairing
10.1117/12.921129
◽
2011
◽
Author(s):
Jun Shen
◽
Hong Jin
◽
Zhiyong Yang
◽
Xiang Cui
Keyword(s):
Key Exchange
◽
Tate Pairing
◽
Authenticated Key Exchange
◽
Key Exchange Protocols
◽
Identity Based
Download Full-text
The Exponential Security System TESS: An Identity-Based Cryptographic Protocol for Authenticated Key-Exchange (E.I.S.S.-Report 1995/4)
10.17487/rfc1824
◽
1995
◽
Author(s):
H. Danisch
Keyword(s):
Key Exchange
◽
Security System
◽
Cryptographic Protocol
◽
Authenticated Key Exchange
◽
Identity Based
Download Full-text
Identity-Based Identity-Concealed Authenticated Key Exchange
10.1007/978-3-030-88428-4_32
◽
2021
◽
pp. 651-675
Author(s):
Huanhuan Lian
◽
Tianyu Pan
◽
Huige Wang
◽
Yunlei Zhao
Keyword(s):
Key Exchange
◽
Authenticated Key Exchange
◽
Identity Based
Download Full-text
Certificateless and Identity based Authenticated Key Exchange Protocols
E-Business and Telecommunications - Communications in Computer and Information Science
◽
10.1007/978-3-319-25915-4_14
◽
2015
◽
pp. 255-277
Author(s):
Saikrishna Badrinarayanan
◽
C. Pandu Rangan
Keyword(s):
Key Exchange
◽
Authenticated Key Exchange
◽
Key Exchange Protocols
◽
Identity Based
Download Full-text
Identity-based authenticated key exchange protocols
2010 International Conference on Educational and Information Technology
◽
10.1109/iceit.2010.5608417
◽
2010
◽
Cited By ~ 2
Author(s):
Li Xiaoyong
◽
Zhang Hui
Keyword(s):
Key Exchange
◽
Authenticated Key Exchange
◽
Key Exchange Protocols
◽
Identity Based
Download Full-text
Integrating identity-based and certificate-based authenticated key exchange protocols
International Journal of Information Security
◽
10.1007/s10207-011-0136-3
◽
2011
◽
Vol 10
(4)
◽
pp. 201-212
◽
Cited By ~ 7
Author(s):
Berkant Ustaoğlu
Keyword(s):
Key Exchange
◽
Authenticated Key Exchange
◽
Key Exchange Protocols
◽
Identity Based
Download Full-text
Identity-Based and Inter-Domain Password Authenticated Key Exchange for Lightweight Clients
21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)
◽
10.1109/ainaw.2007.203
◽
2007
◽
Cited By ~ 3
Author(s):
Ford Long Wong
◽
Hoon Wei Lim
Keyword(s):
Key Exchange
◽
Authenticated Key Exchange
◽
Identity Based
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close