Authenticated Group Key Agreement Protocol Without Pairing
Gaurav Sharma, Rajeev Anand Sahu, Veronika Kuchta, Olivier Markowitch, Suman Bala
Book:
Lecture Notes in Computer Science
(Information and Communications Security)
Volume 10631
(2018),
p. 606
A Novel ID-Based Authentication and Key Exchange Protocol Resistant to Ephemeral-Secret-Leakage Attacks for Mobile Devices
Yuh-Min Tseng, Sen-Shan Huang, Tung-Tso Tsai, Li Tseng
Journal:
International Journal of Distributed Sensor Networks
Volume 11,
Issue 5
(2015),
p. 898716
A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants
Tsu-Yang Wu, Tung-Tso Tsai, Yuh-Min Tseng
Journal:
The Scientific World Journal
Volume 2014
(2014),
p. 1
A provable authenticated group key agreement protocol for mobile environment
Hung-Min Sun, Bing-Zhe He, Chien-Ming Chen, Tsu-Yang Wu, Chia-Hsien Lin, Huaxiong Wang
Journal:
Information Sciences
Volume 321
(2015),
p. 224
A secure and efficient group key agreement approach for mobile ad hoc networks
Orhan Ermiş, Şerif Bahtiyar, Emin Anarım, M. Ufuk Çağlayan
Journal:
Ad Hoc Networks
Volume 67
(2017),
p. 24
A twofold group key agreement protocol for NoC‐based MPSoCs
Gaurav Sharma, Veronika Kuchta, Rajeev Anand Sahu, Soultana Ellinidou, Suman Bala, Olivier Markowitch, Jean‐Michel Dricot
Journal:
Transactions on Emerging Telecommunications Technologies
Volume 30,
Issue 6
(2019)
An ECC‐based authenticated group key exchange protocol in IBE framework
Daya Sagar Gupta, G. P. Biswas
Journal:
International Journal of Communication Systems
Volume 30,
Issue 18
(2017)
Efficient searchable ID-based encryption with a designated server
Tsu-Yang Wu, Tung-Tso Tsai, Yuh-Min Tseng
Journal:
annals of telecommunications - annales des télécommunications
Volume 69,
Issue 7-8
(2014),
p. 391
Enhancement on strongly secure group key agreement
Yuh‐Min Tseng, Tung‐Tso Tsai, Sen‐Shan Huang
Journal:
Security and Communication Networks
Volume 8,
Issue 2
(2015),
p. 126
Provably secure revocable ID‐based signature in the standard model
Tung‐Tso Tsai, Yuh‐Min Tseng, Tsu‐Yang Wu
Journal:
Security and Communication Networks
Volume 6,
Issue 10
(2013),
p. 1250