Login
Register
Home
Issues
Volume 17, Issue 4 (2006)
On the Security Analysis of Lee, Hwang & ...
Informatica
Information
Submit your article
For Referees
Help
ATTENTION!
Article info
Related articles
Cited by
More
Article info
Related articles
Cited by
Cited by
5
On the Security Analysis of Lee, Hwang & Lee (2004) and Song & Kim (2000) Key Exchange / Agreement Protocols
2010 2nd IEEE International Conference on Information Management and Engineering
Shuangqing Liu, Shengbao Wang, Qizhen Wang, Huan Liu, Jiajun Shen
https://doi.org/10.1109/ICIME.2010.5477789
Conference
(2010), p. 530
A Robust Authentication Scheme With Continuously Updated Information for Vehicular Sensor Networks
Xin Liu, Ruisheng Zhang
https://doi.org/10.1109/ACCESS.2018.2880984
Journal
IEEE Access
Volume 6 (2018), p. 70473
A Temporal Credential-Based Mutual Authentication with Multiple-Password Scheme for Wireless Sensor Networks
Xin Liu, Ruisheng Zhang, Qidong Liu, Yongtang Shi
https://doi.org/10.1371/journal.pone.0170657
Journal
PLOS ONE
Volume 12, Issue 1 (2017), p. e0170657
A provably secure authenticated key agreement protocol for wireless communications
Hua Guo, Chang Xu, Yi Mu, Zhoujun Li
https://doi.org/10.1016/j.compeleceng.2011.10.015
Journal
Computers & Electrical Engineering
Volume 38, Issue 3 (2012), p. 563
Two proposed identity-based three-party authenticated key agreement protocols from pairings
Marko Hölbl, Tatjana Welzer, Boštjan Brumen
https://doi.org/10.1016/j.cose.2009.08.006
Journal
Computers & Security
Volume 29, Issue 2 (2010), p. 244
Export citation
Copy and paste formatted citation
Formatted citation
Placeholder
Citation style
AMS -- Americal Mathematical Society
APA -- American Psychological Association 6th ed.
Chicago -- The Chicago Manual of Style 17th ed.
Download citation in file
Export format
BibTeX
RIS
Authors
Placeholder
Share
RSS
To top