[1]
|
Saha, M. and RoyChowdhury, D. (2009) Provably Secure Key Establishment Protocol Using One-Way Functions. Journal of Discrete Mathematical Sciences & Cryptography, 12, 139-158.
|
[2]
|
Menezes, A., van Oorschot, P. and Vanstone, S. (2010) Handbook of Applied Cryptography. CRC Press, Boca Raton.
|
[3]
|
Vesterås, B. (2006) Analysis of Key Agreement Protocols, 1-46.
|
[4]
|
Dutta, R. and Barua, R. (2005) Overview of Key Agreement Protocols. Cryptology ePrint Archive, 1-46.
|
[5]
|
Diffie, W. and Hellman, M. (1976) New Directions in Cryptography. IEEE Transaction on Information Theory, 22, 644-654. http://dx.doi.org/10.1109/TIT.1976.1055638
|
[6]
|
Mohamed, N., Yasmine, A., Galal, E. and Amr, A. (2013) New Authenticated Key Agreement Protocols. International Multi Conference of Engineering and Computer Scientists, 1, 58-63
|
[7]
|
Elkamchouchi, H.M., Saleh, Y.A. and Sary, A.M. (2011) New Authenticated Key Agreement Protocols. International Conference on Computer Engineering & Systems (ICCES), Cairo, 29 November 2011-1 December 2011, 58-63.
|
[8]
|
Boyd, C. and Mathuria, A. (2003) Protocols for Authentication and Key Establishment. Springer, Berlin, Heidelberg.
|
[9]
|
Lopez, J. and Dahab, R. (2000) An Overview of Elliptic Curve Cryptography. Technical report, Institute of Computing, State University of Campinas, Brazil, 1-35.
|
[10]
|
Kar, J. (2014) Provably Secure Online/Off-Line Identity-Based Signature Scheme for Wireless Sensor Network. International Journal of Network Security, Taiwan, 16, 26-36.
|
[11]
|
Harn, L., Hsin, W.J. and Mehta, M. (2005) Authenticated Diffie-Hellman Key Agreement Protocol Using a Single Cryptographic Assumption. IEEE Proceeding of Communication, 152, 404-410.
|
[12]
|
Wen, H.A., Lin, C.L. and Hwang, T. (2006) Provably Secure Authenticated Key Exchange Protocols for Low Power Computing Clients. Computer & Security, 25, 106-113. http://dx.doi.org/10.1016/j.cose.2005.09.010
|
[13]
|
Kar, J. (2014) A Novel Construction of Certificateless Signcryption Scheme for Smart Card. In: Case Studies in Secure Computing Achievements and Trends, CRC Press, Taylor and Francis, New York, Chapter-22, 437-456.
|
[14]
|
Popescu, C. (2004) A Secure Authenticate Key Agreement Protocol. IEEE MELECON, Mediterranean, 12-15 May 2004, 783-786.
|
[15]
|
Tseng, Y.M. (2005) Efficient Authenticated Key Agreement Protocols Resistant to a Denial-of-Service Attack. International Journal of Network Management, 15, 193-202. http://dx.doi.org/10.1002/nem.561
|
[16]
|
Yoon, E.J. and Yoo, K.Y. (2005) New Efficient Simple Authenticated Key Agreement Protocol. Computing and Combinatorics, 3595, 945-954. http://dx.doi.org/10.1007/11533719_95
|
[17]
|
Nabil, M., Abouelseoud, Y., Elkobrosy, G. and Abdelrazek, A. (2013) Certificate-Based Authenticated Key Agreement Protocols. Proceeding of IEEE ICCAT, Computer Applications Technology (ICCAT), 2013 International Conference on Location City of Sousse, 20-22 January 2013, 1-7.
|
[18]
|
Kar, J. (2014) Authenticated Multiple-Key Establishment Protocol for Wireless Sensor Networks. In: Case Studies in Secure Computing Achievements and Trends, CRC Press, Taylor and Francis, New York, Chapter-04, 67-88.
|