Cited by 5
On the Security Analysis of Lee, Hwang & Lee (2004) and Song & Kim (2000) Key Exchange / Agreement Protocols

2010 2nd IEEE International Conference on Information Management and Engineering
Shuangqing Liu, Shengbao Wang, Qizhen Wang, Huan Liu, Jiajun Shen
Conference:  (2010), p. 530
A Robust Authentication Scheme With Continuously Updated Information for Vehicular Sensor Networks
Xin Liu, Ruisheng Zhang
Journal:  IEEE Access Volume 6 (2018), p. 70473
A Temporal Credential-Based Mutual Authentication with Multiple-Password Scheme for Wireless Sensor Networks
Xin Liu, Ruisheng Zhang, Qidong Liu, Yongtang Shi
Journal:  PLOS ONE Volume 12, Issue 1 (2017), p. e0170657
A provably secure authenticated key agreement protocol for wireless communications
Hua Guo, Chang Xu, Yi Mu, Zhoujun Li
Journal:  Computers & Electrical Engineering Volume 38, Issue 3 (2012), p. 563
Two proposed identity-based three-party authenticated key agreement protocols from pairings
Marko Hölbl, Tatjana Welzer, Boštjan Brumen
Journal:  Computers & Security Volume 29, Issue 2 (2010), p. 244