Cited by 10
Towards ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants

Authenticated Group Key Agreement Protocol Without Pairing
Gaurav Sharma, Rajeev Anand Sahu, Veronika Kuchta, Olivier Markowitch, Suman Bala
Book:  Lecture Notes in Computer Science (Information and Communications Security) Volume 10631 (2018), p. 606
A Novel ID-Based Authentication and Key Exchange Protocol Resistant to Ephemeral-Secret-Leakage Attacks for Mobile Devices
Yuh-Min Tseng, Sen-Shan Huang, Tung-Tso Tsai, Li Tseng
Journal:  International Journal of Distributed Sensor Networks Volume 11, Issue 5 (2015), p. 898716
A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants
Tsu-Yang Wu, Tung-Tso Tsai, Yuh-Min Tseng
Journal:  The Scientific World Journal Volume 2014 (2014), p. 1
A provable authenticated group key agreement protocol for mobile environment
Hung-Min Sun, Bing-Zhe He, Chien-Ming Chen, Tsu-Yang Wu, Chia-Hsien Lin, Huaxiong Wang
Journal:  Information Sciences Volume 321 (2015), p. 224
A secure and efficient group key agreement approach for mobile ad hoc networks
Orhan Ermiş, Şerif Bahtiyar, Emin Anarım, M. Ufuk Çağlayan
Journal:  Ad Hoc Networks Volume 67 (2017), p. 24
A twofold group key agreement protocol for NoC‐based MPSoCs
Gaurav Sharma, Veronika Kuchta, Rajeev Anand Sahu, Soultana Ellinidou, Suman Bala, Olivier Markowitch, Jean‐Michel Dricot
Journal:  Transactions on Emerging Telecommunications Technologies Volume 30, Issue 6 (2019)
An ECC‐based authenticated group key exchange protocol in IBE framework
Daya Sagar Gupta, G. P. Biswas
Journal:  International Journal of Communication Systems Volume 30, Issue 18 (2017)
Efficient searchable ID-based encryption with a designated server
Tsu-Yang Wu, Tung-Tso Tsai, Yuh-Min Tseng
Journal:  annals of telecommunications - annales des télécommunications Volume 69, Issue 7-8 (2014), p. 391
Enhancement on strongly secure group key agreement
Yuh‐Min Tseng, Tung‐Tso Tsai, Sen‐Shan Huang
Journal:  Security and Communication Networks Volume 8, Issue 2 (2015), p. 126
Provably secure revocable ID‐based signature in the standard model
Tung‐Tso Tsai, Yuh‐Min Tseng, Tsu‐Yang Wu
Journal:  Security and Communication Networks Volume 6, Issue 10 (2013), p. 1250