Practical and Exposure-resilient Hierarchical ID-based Authenticated Key Exchange without Random Oracles
2009 ◽
pp. 154-167
◽
2014 ◽
Vol E97.A
(6)
◽
pp. 1335-1344
2014 ◽
Vol 8
(6)
◽
pp. 1118-1131
◽
2011 ◽
pp. 607-625
◽
2012 ◽
pp. 264-275
◽
2013 ◽
Vol E96.A
(6)
◽
pp. 1112-1123
◽