参考文献
|
-
Chien, H. Y.(2006).ID-based Tripartite Multiple Key Agreement Protocol facilitating Computer Auditing and Transaction Refereeing.Journal of Information Management,13(4),185-204.
連結:
-
Al-Riyami, S. S.,Paterson, K. G.(2003).Tripartite Authenticated Key Agreement Protocols from Pairings.IMA Conference on Cryptography and Coding, LNCS 2898
-
Al-Riyami, S. S.,Paterson, K. G.(2002).Cryptology ePrint ArchiveCryptology ePrint Archive,未出版
-
Bellare, M.,Pointcheval, D.,Rogaway, P.(2000).Authenticated key exchange secure against dictionary attacks.Eurocrypt
-
Bellare, M.,Rogaway, P.(1995).Provably secure session key distribution: The three party case.27th ACM Symposium on the Theory of Computing
-
Burrows, M.,Abadi, M.,Needham, R.(1990).A logic of authentication.ACM TRANSACTIONS ON COMPUTER SYSTEMS,8(1),18-36.
-
Canetti, R.,Goldreich, O.,Halevi, S.(2004).The random oracle methodology, revisited.Journal of the ACM,51(4),557-591.
-
Canetti, R.,Krawczyk, H.(2001).Analysis of key-exchange protocols and their use for building secure channels.Eurocrypt
-
Chien, H. Y.(2005).Cryptology ePrint ArchiveCryptology ePrint Archive,未出版
-
Chien, H. Y.,Lin, R. Y.(2008).Improved ID-based security framework for ad hoc network.Ad Hoc Networks,6(1),47-60.
-
Chien, H. Y.,Wang, R. C.,Yang, C. C.(2005).Note on Robust and Simple Authentication Protocol.The Computer Journal,48(1),27-29.
-
Chien, H. Y.,Wu, T. C.,Jan, J. K.,Tseng, Y. M.(2001).Cryptanalysis of Chang-Wu's Group-oriented Authentication and Key Exchange Protocols.Information Processing Letters,80(2),113-117.
-
Diffie, W.,van Oorshot, P.C.,Wiener, M.(1992).Authentication and authenticated key exchanges.Designs, codes, and Cryptography,2(2),107-125.
-
Horng, G.,Liu, C.-L.,Liu, H.-Y.(2004).Security Analysis of a Tripartite Authenticated Key Agreement Protocol Based on Weil Pairing.ICS 2004 - International Computer Symposium,Taiwan:
-
Joux, A.(2000).A "One round protocol for tripartite Diffie-Hellman".ANTS IV
-
Lin, C. H.,Lin, H. H.(2005).Secure One-Round Tripartite Authenticated Key Agreement Protocol from Weil Pairing.Proceedings of International Conference on Advanced Information Networking and Applications (AINA 2005)
-
Lu, R.,Cao, Z.,Wang, S. B.,Bao, H. Y.(2007).A New ID-Based Deniable Authentication Protocol.Informatica,18(1),67-78.
-
O''Higgins, B.,Diffie, W.,Strawcznski, L.,Hoog, R.(1987).Encryption and ISDN-A Natural Fit.International Switching Symposium (ISS87)
-
Raymond, C. K. K.,Colin, B.,Yvonne, H.(2005).Examining indistinguishability-based proof models for key establishment protocols.ASIACRYPT 2005
-
Shim, K.(2003).Efficient one round tripartite authenticated key agreement protocol from Weil pairing.Electron. Lett.,39(2),208-209.
-
Shim, K.(2003).Cryptology ePrint ArchiveCryptology ePrint Archive,未出版
|