Cited by 10
Towards ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants

A Novel ID-Based Authentication and Key Exchange Protocol Resistant to Ephemeral-Secret-Leakage Attacks for Mobile Devices
Yuh-Min Tseng, Sen-Shan Huang, Tung-Tso Tsai, Li Tseng
Journal  International Journal of Distributed Sensor Networks Volume 11, Issue 5 (2015), p. 898716
A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants
Tsu-Yang Wu, Tung-Tso Tsai, Yuh-Min Tseng
Journal  The Scientific World Journal Volume 2014 (2014), p. 1
A provable authenticated group key agreement protocol for mobile environment
Hung-Min Sun, Bing-Zhe He, Chien-Ming Chen, Tsu-Yang Wu, Chia-Hsien Lin, Huaxiong Wang
Journal  Information Sciences Volume 321 (2015), p. 224
A secure and efficient group key agreement approach for mobile ad hoc networks
Orhan Ermiş, Şerif Bahtiyar, Emin Anarım, M. Ufuk Çağlayan
Journal  Ad Hoc Networks Volume 67 (2017), p. 24
A twofold group key agreement protocol for NoC‐based MPSoCs
Gaurav Sharma, Veronika Kuchta, Rajeev Anand Sahu, Soultana Ellinidou, Suman Bala, Olivier Markowitch, Jean‐Michel Dricot
Journal  Transactions on Emerging Telecommunications Technologies Volume 30, Issue 6 (2019)
An ECC‐based authenticated group key exchange protocol in IBE framework
Daya Sagar Gupta, G. P. Biswas
Journal  International Journal of Communication Systems Volume 30, Issue 18 (2017)
Authenticated Group Key Agreement Protocol Without Pairing
Gaurav Sharma, Rajeev Anand Sahu, Veronika Kuchta, Olivier Markowitch, Suman Bala
Book  Lecture Notes in Computer Science (Information and Communications Security) Volume 10631 (2018), p. 606
Efficient searchable ID-based encryption with a designated server
Tsu-Yang Wu, Tung-Tso Tsai, Yuh-Min Tseng
Journal  annals of telecommunications - annales des télécommunications Volume 69, Issue 7-8 (2014), p. 391
Enhancement on strongly secure group key agreement
Yuh‐Min Tseng, Tung‐Tso Tsai, Sen‐Shan Huang
Journal  Security and Communication Networks Volume 8, Issue 2 (2015), p. 126
Provably secure revocable ID‐based signature in the standard model
Tung‐Tso Tsai, Yuh‐Min Tseng, Tsu‐Yang Wu
Journal  Security and Communication Networks Volume 6, Issue 10 (2013), p. 1250