Cited by 28
An Efficient Two-Party Identity-Based Key Exchange Protocol

2010 2nd IEEE International Conference on Information Management and Engineering
Shuangqing Liu, Shengbao Wang, Qizhen Wang, Huan Liu, Jiajun Shen
Conference:  (2010), p. 530
ICTC 2011
Eun-Jun Yoon, Kee-Young Yoo
Conference:  (2011), p. 547
An IBE-Based Authenticated Key Transfer Protocol on Elliptic Curves
Daya Sagar Gupta
Book:  (2020), p. 1112
30th IEEE International Performance Computing and Communications Conference
Swapnoneel Roy, Amlan Kumar Das, Yu Li
Conference:  (2011), p. 1
2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications
Minghui Zheng, Jing Chen
Conference:  (2012), p. 1299
GLOBECOM 2020 - 2020 IEEE Global Communications Conference
Saiful Islam Salim, Adnan Quaium, Sriram Chellappan, A. B. M. Alim Al Islam
Conference:  (2020), p. 1
Performance Analysis of AES, RSA and Hashing Algorithm Using Web Technology
Diksha Tiwari, Anand Singh, Abhishek Prabhakar
Book:  Algorithms for Intelligent Systems (Computing Algorithms with Applications in Engineering) (2020), p. 413
A Secure Identity-Based Three-Party Authenticated Key Agreement Protocol Using Bilinear Pairings
Daya Sagar Gupta, S K Hafizul Islam, Mohammad S. Obaidat
Book:  Lecture Notes on Data Engineering and Communications Technologies (Innovative Data Communication Technologies and Application) Volume 46 (2020), p. 1
Data Encryption on Cloud Database Using Quantum Computing for Key Distribution
Krishna Keerthi Chennam, Rajanikanth Aluvalu, V. Uma Maheswari
Book:  Advances in Intelligent Systems and Computing (Machine Learning and Information Processing) Volume 1311 (2021), p. 309
Quantum Cryptography for the Future Internet and the Security Analysis
P. William, A.B. Pawar, M.A. Jawale
Book:  (2023), p. 175
2010 WASE International Conference on Information Engineering
Shiwu Zhang, Qingfeng Cheng, Xuekui Wang
Conference:  (2010), p. 113
Proceedings of the 7th International Conference on Security of Information and Networks
Maryam Farajzadeh Zanjani, Seyed Masoud Alavi Abhari, Alexander G. Chefranov
Conference:  (2014), p. 166
A Secured Data Storage in Cloud Computing by Using Block Design Based Key Agreement
Kamparapu Bhanu Rajesh Naidu, M V Anjana Devi, Pragathi Vulpala, Dr. Mahesh Kotha
Journal:  International Journal of Scientific Research in Computer Science, Engineering and Information Technology (2023), p. 231
An Anonymous Device to Device Authentication Protocol Using ECC and Self Certified Public Keys Usable in Internet of Things Based Autonomous Devices
Bander A. Alzahrani, Shehzad Ashraf Chaudhry, Ahmed Barnawi, Abdullah Al-Barakati, Taeshik Shon
Journal:  Electronics Volume 9, Issue 3 (2020), p. 520
An efficient dynamic group key agreement protocol for imbalanced wireless networks
Yun‐Hsin Chuang, Yuh‐Min Tseng
Journal:  International Journal of Network Management Volume 20, Issue 4 (2010), p. 167
An efficient protocol for two‐party explicit authenticated key agreement
Minghui Zheng, Huihua Zhou, Jing Chen
Journal:  Concurrency and Computation: Practice and Experience Volume 27, Issue 12 (2015), p. 2954
Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing
Jian Shen, Tianqi Zhou, Debiao He, Yuexin Zhang, Xingming Sun, Yang Xiang
Journal:  IEEE Transactions on Dependable and Secure Computing Volume 16, Issue 6 (2019), p. 996
Communication-efficient revocable identity-based signature from multilinear maps
Jing Zhao, Bin Wei, Yang Su
Journal:  Journal of Ambient Intelligence and Humanized Computing Volume 10, Issue 1 (2019), p. 187
Cryptanalysis of Two Identity-Based Authenticated Key Agreement Protocols
Kyung-Ah Shim
Journal:  IEEE Communications Letters Volume 16, Issue 4 (2012), p. 554
Design of Two-Party Authenticated Key Agreement Protocol Based on ECC and Self-Certified Public Keys
SK Hafizul Islam, G. P. Biswas
Journal:  Wireless Personal Communications Volume 82, Issue 4 (2015), p. 2727
Development of A Novel Block Design Based Key Agreement Protocol for Cloud Environment to Improve Efficient Performance and Security
Dr. Gangolu Yedukondalu, Guna Santhoshi, Karnati Durga, Kotha Chandrakala, Dr. Mahesh Kotha
Journal:  International Journal of Scientific Research in Science and Technology (2022), p. 52
Distance Enhancement of Quantum Cryptography through MANET
R. Priyavani, Dr. N. Kowsalya
Journal:  International Journal of Scientific Research in Science and Technology (2022), p. 86
Evaluating Three Party Authentication and Key Agreement Protocols Using IP Multimedia Server–Client Systems
B. D. Deebak, R. Muthaiah, K. Thenmozhi, P. Swaminathan
Journal:  Wireless Personal Communications Volume 81, Issue 1 (2015), p. 77
Provably secure two-party authenticated key agreement protocol for post-quantum environments
SK Hafizul Islam
Journal:  Journal of Information Security and Applications Volume 52 (2020), p. 102468
Quantum Cryptography for the Future Internet and the Security Analysis
Tianqi Zhou, Jian Shen, Xiong Li, Chen Wang, Jun Shen
Journal:  Security and Communication Networks Volume 2018 (2018), p. 1
The recent trends in cyber security: A review
Jagpreet Kaur, K .R. Ramkumar
Journal:  Journal of King Saud University - Computer and Information Sciences Volume 34, Issue 8 (2022), p. 5766
Two ID-based authenticated schemes with key agreement for mobile environments
Chih-Ho Chou, Kuo-Yu Tsai, Chung-Fu Lu
Journal:  The Journal of Supercomputing Volume 66, Issue 2 (2013), p. 973
Two improved two-party identity-based authenticated key agreement protocols
Marko Hölbl, Tatjana Welzer
Journal:  Computer Standards & Interfaces Volume 31, Issue 6 (2009), p. 1056