A Novel ID-Based Authentication and Key Exchange Protocol Resistant to Ephemeral-Secret-Leakage Attacks for Mobile Devices
Yuh-Min Tseng, Sen-Shan Huang, Tung-Tso Tsai, Li Tseng
Journal
International Journal of Distributed Sensor Networks
Volume 11,
Issue 5
(2015),
p. 898716
A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants
Tsu-Yang Wu, Tung-Tso Tsai, Yuh-Min Tseng
Journal
The Scientific World Journal
Volume 2014
(2014),
p. 1
A provable authenticated group key agreement protocol for mobile environment
Hung-Min Sun, Bing-Zhe He, Chien-Ming Chen, Tsu-Yang Wu, Chia-Hsien Lin, Huaxiong Wang
Journal
Information Sciences
Volume 321
(2015),
p. 224
A secure and efficient group key agreement approach for mobile ad hoc networks
Orhan Ermiş, Şerif Bahtiyar, Emin Anarım, M. Ufuk Çağlayan
Journal
Ad Hoc Networks
Volume 67
(2017),
p. 24
A twofold group key agreement protocol for NoC‐based MPSoCs
Gaurav Sharma, Veronika Kuchta, Rajeev Anand Sahu, Soultana Ellinidou, Suman Bala, Olivier Markowitch, Jean‐Michel Dricot
Journal
Transactions on Emerging Telecommunications Technologies
Volume 30,
Issue 6
(2019)
An ECC‐based authenticated group key exchange protocol in IBE framework
Daya Sagar Gupta, G. P. Biswas
Journal
International Journal of Communication Systems
Volume 30,
Issue 18
(2017)
Authenticated Group Key Agreement Protocol Without Pairing
Gaurav Sharma, Rajeev Anand Sahu, Veronika Kuchta, Olivier Markowitch, Suman Bala
Book
Lecture Notes in Computer Science (Information and Communications Security)
Volume 10631
(2018),
p. 606
Efficient searchable ID-based encryption with a designated server
Tsu-Yang Wu, Tung-Tso Tsai, Yuh-Min Tseng
Journal
annals of telecommunications - annales des télécommunications
Volume 69,
Issue 7-8
(2014),
p. 391
Enhancement on strongly secure group key agreement
Yuh‐Min Tseng, Tung‐Tso Tsai, Sen‐Shan Huang
Journal
Security and Communication Networks
Volume 8,
Issue 2
(2015),
p. 126
Provably secure revocable ID‐based signature in the standard model
Tung‐Tso Tsai, Yuh‐Min Tseng, Tsu‐Yang Wu
Journal
Security and Communication Networks
Volume 6,
Issue 10
(2013),
p. 1250