Cited by 25
An Efficient Two-Party Identity-Based Key Exchange Protocol

Shuangqing Liu, Shengbao Wang, Qizhen Wang, Huan Liu, Jiajun Shen
Journal:  (2010), p. 530
Eun-Jun Yoon, Kee-Young Yoo
Journal:  (2011), p. 547
2010 WASE International Conference on Information Engineering
Shiwu Zhang, Qingfeng Cheng, Xuekui Wang
Conference:  (2010), p. 113
An IBE-Based Authenticated Key Transfer Protocol on Elliptic Curves
Daya Sagar Gupta
Book:  (2020), p. 1112
30th IEEE International Performance Computing and Communications Conference
Swapnoneel Roy, Amlan Kumar Das, Yu Li
Conference:  (2011), p. 1
2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications
Minghui Zheng, Jing Chen
Conference:  (2012), p. 1299
GLOBECOM 2020 - 2020 IEEE Global Communications Conference
Saiful Islam Salim, Adnan Quaium, Sriram Chellappan, A. B. M. Alim Al Islam
Conference:  (2020), p. 1
Performance Analysis of AES, RSA and Hashing Algorithm Using Web Technology
Diksha Tiwari, Anand Singh, Abhishek Prabhakar
Book:  Algorithms for Intelligent Systems (Computing Algorithms with Applications in Engineering) (2020), p. 413
A Secure Identity-Based Three-Party Authenticated Key Agreement Protocol Using Bilinear Pairings
Daya Sagar Gupta, S K Hafizul Islam, Mohammad S. Obaidat
Book:  Lecture Notes on Data Engineering and Communications Technologies (Innovative Data Communication Technologies and Application) Volume 46 (2020), p. 1
Maryam Farajzadeh Zanjani, Seyed Masoud Alavi Abhari, Alexander G. Chefranov
Journal:  (2014), p. 166
Data Encryption on Cloud Database Using Quantum Computing for Key Distribution
Krishna Keerthi Chennam, Rajanikanth Aluvalu, V. Uma Maheswari
Book:  Advances in Intelligent Systems and Computing (Machine Learning and Information Processing) Volume 1311 (2021), p. 309
An Anonymous Device to Device Authentication Protocol Using ECC and Self Certified Public Keys Usable in Internet of Things Based Autonomous Devices
Bander A. Alzahrani, Shehzad Ashraf Chaudhry, Ahmed Barnawi, Abdullah Al-Barakati, Taeshik Shon
Journal:  Electronics Volume 9, Issue 3 (2020), p. 520
An efficient dynamic group key agreement protocol for imbalanced wireless networks
Yun-Hsin Chuang, Yuh-Min Tseng
Journal:  International Journal of Network Management (2010), p. n/a
An efficient protocol for two-party explicit authenticated key agreement
Minghui Zheng, Huihua Zhou, Jing Chen
Journal:  Concurrency and Computation: Practice and Experience Volume 27, Issue 12 (2015), p. 2954
Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing
Jian Shen, Tianqi Zhou, Debiao He, Yuexin Zhang, Xingming Sun, Yang Xiang
Journal:  IEEE Transactions on Dependable and Secure Computing Volume 16, Issue 6 (2019), p. 996
Communication-efficient revocable identity-based signature from multilinear maps
Jing Zhao, Bin Wei, Yang Su
Journal:  Journal of Ambient Intelligence and Humanized Computing Volume 10, Issue 1 (2019), p. 187
Cryptanalysis of Two Identity-Based Authenticated Key Agreement Protocols
Kyung-Ah Shim
Journal:  IEEE Communications Letters Volume 16, Issue 4 (2012), p. 554
Design of Two-Party Authenticated Key Agreement Protocol Based on ECC and Self-Certified Public Keys
SK Hafizul Islam, G. P. Biswas
Journal:  Wireless Personal Communications Volume 82, Issue 4 (2015), p. 2727
Distance Enhancement of Quantum Cryptography through MANET
R. Priyavani, Dr. N. Kowsalya
Journal:  International Journal of Scientific Research in Science and Technology (2022), p. 86
Evaluating Three Party Authentication and Key Agreement Protocols Using IP Multimedia Server–Client Systems
B. D. Deebak, R. Muthaiah, K. Thenmozhi, P. Swaminathan
Journal:  Wireless Personal Communications Volume 81, Issue 1 (2015), p. 77
Provably secure two-party authenticated key agreement protocol for post-quantum environments
SK Hafizul Islam
Journal:  Journal of Information Security and Applications Volume 52 (2020), p. 102468
Quantum Cryptography for the Future Internet and the Security Analysis
Tianqi Zhou, Jian Shen, Xiong Li, Chen Wang, Jun Shen
Journal:  Security and Communication Networks Volume 2018 (2018), p. 1
The recent trends in cyber security: A review
Jagpreet Kaur, K .R. Ramkumar
Journal:  Journal of King Saud University - Computer and Information Sciences (2021)
Two ID-based authenticated schemes with key agreement for mobile environments
Chih-Ho Chou, Kuo-Yu Tsai, Chung-Fu Lu
Journal:  The Journal of Supercomputing Volume 66, Issue 2 (2013), p. 973
Two improved two-party identity-based authenticated key agreement protocols
Marko Hölbl, Tatjana Welzer
Journal:  Computer Standards & Interfaces Volume 31, Issue 6 (2009), p. 1056