Cited by 13
A New ID-Based Deniable Authentication Protocol

2009 IEEE International Symposium on Parallel and Distributed Processing with Applications
Chengyu Fan, Shijie Zhou, Fagen Li
Conference:  (2009), p. 474
Non-interactive Deniable Authentication Protocols
Haibo Tian, Xiaofeng Chen, Zhengtao Jiang
Book:  Lecture Notes in Computer Science (Information Security and Cryptology) Volume 7537 (2012), p. 142
CLIBDA: A Deniable Authentication Scheme for Pervasive Computing Environment
Emmanuel Ahene, Yuanfeng Guan, Zhiwei Zhang, Fagen Li
Book:  Communications in Computer and Information Science (Frontiers in Cyber Security) Volume 1105 (2019), p. 67
Analysis of an Authenticated 3-Round Identity-Based Group Key Agreement Protocol
Wei Yuan, Liang Hu, Hongtu Li, Jianfeng Chu
Book:  Lecture Notes in Electrical Engineering (Computer, Informatics, Cybernetics and Applications) Volume 107 (2012), p. 889
Heterogeneous Deniable Authentication for E-Voting Systems
Chunhua Jin, Guanhua Chen, Changhui Yu, Jianyang Zhao
Book:  Communications in Computer and Information Science (Frontiers in Cyber Security) Volume 879 (2018), p. 41
2011 International Conference on Network Computing and Information Security
Wei Yuan, Liang Hu, Hong-tu Li, Kuo Zhao, Jiang-feng Chu, Yuyu Sun
Conference:  (2011), p. 249
An Enhanced Authenticated 3-round Identity-Based Group Key Agreement Protocol
Wei Yuan, Liang Hu, Hongtu Li, Jianfeng Chu
Book:  Lecture Notes in Electrical Engineering (Green Communications and Networks) Volume 113 (2012), p. 549
A novel certificateless deniable authentication protocol
Chunhua Jin, Chunxiang Xu, Fagen Li, Xiaojun Zhang
Journal:  International Journal of Computers and Applications Volume 37, Issue 3-4 (2015), p. 181
A simple deniable authentication protocol based on the Diffie–Hellman algorithm
Rongxing Lu, Xiaodong Lin, Zhenfu Cao, Liuquan Qin, Xiaohui Liang
Journal:  International Journal of Computer Mathematics Volume 85, Issue 9 (2008), p. 1315
Efficient deniable authentication and its application in location-based services
Emmanuel Ahene, Joojo Walker, Ikram Ali, Kwame Ofosuhene Peasah, Michael Asante
Journal:  Computers and Electrical Engineering Volume 100 (2022), p. 107958
Enhancement of an Authenticated 3-round Identity-Based Group Key Agreement Protocol
Wei Yuan, Liang Hu, Hongtu Li, Jianfeng Chu, Yuyu Sun
Journal:  Journal of Networks Volume 6, Issue 11 (2011)
Heterogeneous deniable authentication and its application to e-voting systems
Chunhua Jin, Guanhua Chen, Changhui Yu, Jianyang Zhao, Ying Jin, Jinsong Shan
Journal:  Journal of Information Security and Applications Volume 47 (2019), p. 104
Robust Deniable Authentication Protocol
Eun-Jun Yoon, Kee-Young Yoo, Sang-Soo Yeo, Changhoon Lee
Journal:  Wireless Personal Communications Volume 55, Issue 1 (2010), p. 81