[图书][B] Protocols for authentication and key establishment

C Boyd, A Mathuria, D Stebila - 2003 - Springer
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …

Provably secure authenticated group Diffie-Hellman key exchange

E Bresson, O Chevassut, D Pointcheval - ACM Transactions on …, 2007 - dl.acm.org
Authenticated key-exchange protocols allow two participants A and B, communicating over a
public network and each holding an authentication means to exchange a shared secret …

Scyther: Semantics and verification of security protocols

CJF Cremers - 2006 - research.tue.nl
Recent technologies have cleared the way for large scale application of electronic
communication. The open and distributed nature of these communications implies that the …

Scalable protocols for authenticated group key exchange

J Katz, M Yung - Annual international cryptology conference, 2003 - Springer
We consider the fundamental problem of authenticated group key exchange among n
parties within a larger and insecure public network. A number of solutions to this problem …

Asymmetric group key agreement

Q Wu, Y Mu, W Susilo, B Qin… - Advances in Cryptology …, 2009 - Springer
A group key agreement (GKA) protocol allows a set of users to establish a common secret
via open networks. Observing that a major goal of GKAs for most applications is to establish …

Multivariate analysis of soil heavy metal pollution and landscape pattern in Changhua county in Taiwan

YP Lin, TP Teng, TK Chang - Landscape and Urban planning, 2002 - Elsevier
This study applied factor analysis and landscape indices of 55 sampling sites in Changhua
county in Taiwan to characterize the factor patterns of eight soil heavy metals (As, Cd, Cr …

Efficient ID-based group key agreement with bilinear maps

KY Choi, JY Hwang, DH Lee - International Workshop on Public Key …, 2004 - Springer
In modern collaborative and distributed applications, authenticated group key agreement
(GKA) is one of important issues. Recently identity (ID)-based authenticated GKA has been …

A survey of group key agreement protocols with constant rounds

H Xiong, Y Wu, Z Lu - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Group key agreement (shorten as GKA) protocol enables a group of users to negotiate a one-
time session key and protect the thereafter group-oriented communication with this session …

Scalable protocols for authenticated group key exchange

J Katz, M Yung - Journal of Cryptology, 2007 - Springer
We consider the problem of authenticated group key exchange among n parties
communicating over an insecure public network. A number of solutions to this problem have …

A secure and scalable group key exchange system

M Burmester, Y Desmedt - Information Processing Letters, 2005 - Elsevier
We present a Group Key Exchange protocol which extends in a natural way the Diffie–
Hellman protocol. Our protocol is scalable: it has two rounds (for n> 2 parties) and the …