Cited by 4
An Integrative Framework to Protocol Analysis and Repair: Bellare–Rogaway Model + Planning + Model Checker

A variant of password authenticated key exchange protocol
Yuexin Zhang, Yang Xiang, Wei Wu, Abdulhameed Alelaiwi
Journal:  Future Generation Computer Systems Volume 78 (2018), p. 699
Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography
Debiao He, Sherali Zeadally, Libing Wu, Huaqun Wang
Journal:  Computer Networks Volume 128 (2017), p. 154
Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks"
Mojtaba Alizadeh, Mazdak Zamani, Sabariah Baharun, Azizah Abdul Manaf, Kouichi Sakurai, Hiroki Anada, Hassan Keshavarz, Shehzad Ashraf Chaudhry, Muhammad Khurram Khan, Kim-Kwang Raymond Choo
Journal:  PLOS ONE Volume 10, Issue 11 (2015), p. e0142716
Secure ticket-based authentication method for IoT applications
Mojtaba Alizadeh, Mohammad Hesam Tadayon, Alireza Jolfaei
Journal:  Digital Communications and Networks Volume 9, Issue 3 (2023), p. 710