Showing 1 - 20 results of 27 for search '"Key-exchange"', query time: 0.06s Refine Results
  1. 1

    Consistency of group key exchange protocols by CAO Chun-jie1, MA Jian-feng1, GUO Yuan-bo2

    Published 2008-01-01
    Subjects: “…consistency;group key exchange;attack…”
    Get full text
    Article
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    Predicate-based authenticated key exchange protocol with attribute-hiding by Wen-fen LIU, Jiang-hong WEI, Xue-xian HU

    Published 2012-09-01
    Subjects: “…key exchange protocol;predicate authentication;attribute-hiding;eCK model…”
    Get full text
    Article
  7. 7
  8. 8

    Verifier-based password-authenticated key exchange protocol for three-party by LI Wen-min, WEN Qiao-yan, ZHANG Hua

    Published 2008-01-01
    Subjects: “…password-authenticated key exchange…”
    Get full text
    Article
  9. 9
  10. 10

    Security model for ID-based key exchange by LIU Wen-ju1, ZHANG Jun-wei2, MA Jian-feng2, YANG Chao2, LI Xing-hua2

    Published 2010-01-01
    Subjects: “…ID-based key exchange…”
    Get full text
    Article
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    Three-party password authenticated key agreement protocol with user anonymity based on lattice by Caifen WANG, Li CHEN

    Published 2018-02-01
    Subjects: “…lattice-based cryptology;provably secure;password authentication;key exchange;ring-learning-with-error…”
    Get full text
    Article
  17. 17
  18. 18

    Quantum Resistance Saber-Based Group Key Exchange Protocol for IoT by Fouzia Samiullah, Ming-Lee Gan, Sedat Akleylek, Y. Aun

    Published 2025-01-01
    Subjects: “…group authenticated key exchange…”
    Get full text
    Article
  19. 19
  20. 20