On simple and secure key distribution
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Refinement and extension of encrypted key exchange
ACM SIGOPS Operating Systems Review
The KryptoKnight family of light-weight protocols for authentication and key distribution
IEEE/ACM Transactions on Networking (TON)
Provably secure session key distribution: the three party case
STOC '95 Proceedings of the twenty-seventh annual ACM symposium on Theory of computing
Multi party computations: past and present
PODC '97 Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing
Maintaining authenticated communication in the presence of break-ins
PODC '97 Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing
STOC '98 Proceedings of the thirtieth annual ACM symposium on Theory of computing
A security architecture for the Internet protocol
IBM Systems Journal
Authenticated group key agreement and friends
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
A probabilistic poly-time framework for protocol analysis
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Overlapping execution with transfer using non-strict execution for mobile programs
Proceedings of the eighth international conference on Architectural support for programming languages and operating systems
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Public-key cryptography and password protocols: the multi-user case
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Secure protocol transformation via “expansion”: from two-party to groups
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Authentication primitives and their compilation
Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Mobile values, new names, and secure communication
POPL '01 Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
ACM Transactions on Information and System Security (TISSEC)
The faithfulness of abstract protocol analysis: message authentication
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Provably authenticated group Diffie-Hellman key exchange
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Group security association (GSA) management in IP multicast
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Simple authenticated key agreement protocol resistant to password guessing attacks
ACM SIGOPS Operating Systems Review
Efficient, DoS-resistant, secure key exchange for internet protocols
Proceedings of the 9th ACM conference on Computer and communications security
Probabilistic Polynomial-Time Process Calculus and Security Protocol Analysis
ESOP '01 Proceedings of the 10th European Symposium on Programming Languages and Systems
Formal Eavesdropping and Its Computational Interpretation
TACS '01 Proceedings of the 4th International Symposium on Theoretical Aspects of Computer Software
More Efficient Password-Authenticated Key Exchange
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Proof Techniques for Cryptographic Protocols
ICAL '99 Proceedings of the 26th International Colloquium on Automata, Languages and Programming
Mathematical Models of Computer Security
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
An Identification Scheme Provably Secure against Reset Attack
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Over the Air Service Provisioning
SAC '98 Proceedings of the Selected Areas in Cryptography
Authenticated Diffie-Hellman Key Agreement Protocols
SAC '98 Proceedings of the Selected Areas in Cryptography
Quantum Public-Key Cryptosystems
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
New Paradigms for Constructing Symmetric Encryption Schemes Secure against Chosen-Ciphertext Attack
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Session-Key Generation Using Human Passwords Only
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Threshold Password-Authenticated Key Exchange
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Security Analysis of IKE's Signature-Based Key-Exchange Protocol
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Security Protocols and Specifications
FoSSaCS '99 Proceedings of the Second International Conference on Foundations of Software Science and Computation Structure, Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS'99
On the Risk of Opening Distributed Keys
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Maintaining Security in the Presence of Transient Faults
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
The Security of Cipher Block Chaining
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Anonymous Communication and Anonymous Cash
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Identification Protocols Secure against Reset Attacks
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Universally Composable Notions of Key Exchange and Secure Channels
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Two-Pass Authenticated Key Arrangement Protocol with Key Confirmation
INDOCRYPT '00 Proceedings of the First International Conference on Progress in Cryptology
Password-Authenticated Key Exchange Based on RSA
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)
TCS '00 Proceedings of the International Conference IFIP on Theoretical Computer Science, Exploring New Frontiers of Theoretical Informatics
Practice-Oriented Provable Security
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
Mutual Authentication for Low-Power Mobile Devices
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
Probabilistic Polynomial-Time Equivalence and Security Analysis
FM '99 Proceedings of the Wold Congress on Formal Methods in the Development of Computing Systems-Volume I - Volume I
Round-Optimal Contributory Conference Key Agreement
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Secure Channels Based on Authenticated Encryption Schemes: A Simple Characterization
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Key Establishment in Large Dynamic Groups Using One-Way Function Trees
IEEE Transactions on Software Engineering
Scalability and Flexibility in Authentication Services: The KryptoKnight Approach
INFOCOM '97 Proceedings of the INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution
A Security Analysis of the Cliques Protocols Suites
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Authenticity by Typing for Security Protocols
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Authenticity by typing for security protocols
Journal of Computer Security - Special issue on CSFW14
Some attacks upon authenticated group key agreement protocols
Journal of Computer Security - Special issue on CSFW14
Just fast keying: Key agreement in a hostile internet
ACM Transactions on Information and System Security (TISSEC)
Security of Signature Schemes in a Multi-User Setting
Designs, Codes and Cryptography
Proceedings of the 2003 ACM workshop on Formal methods in security engineering
A secure and scalable group key exchange system
Information Processing Letters
A modular correctness proof of IEEE 802.11i and TLS
Proceedings of the 12th ACM conference on Computer and communications security
A framework for password-based authenticated key exchange1
ACM Transactions on Information and System Security (TISSEC)
An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices
Theoretical Computer Science
Provably secure authenticated group Diffie-Hellman key exchange
ACM Transactions on Information and System Security (TISSEC)
EC2C-PAKA: An efficient client-to-client password-authenticated key agreement
Information Sciences: an International Journal
Information Sciences: an International Journal
Three weaknesses in a simple three-party key exchange protocol
Information Sciences: an International Journal
Authentication tests and disjoint encryption: A design method for security protocols
Journal of Computer Security - Special issue on CSFW15
The reactive simulatability (RSIM) framework for asynchronous systems
Information and Computation
Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
Designs, Codes and Cryptography
Authenticating ad hoc networks by comparison of short digests
Information and Computation
On security proof of McCullagh Barreto's key agreement protocol and its variants
International Journal of Security and Networks
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
Information Sciences: an International Journal
On the protocol composition logic PCL
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Security arguments for the UM key agreement protocol in the NIST SP 800-56A standard
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Non-interactive conference key distribution and its applications
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Provably secure browser-based user-aware mutual authentication over TLS
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Electronic Notes in Theoretical Computer Science (ENTCS)
ID-based one-pass authenticated key establishment
AISC '08 Proceedings of the sixth Australasian conference on Information security - Volume 81
Protocols for purpose-restricted anonymous communications in IP-based wireless networks
Computer Communications
An Elliptic Curve Based Authenticated Key Agreement Protocol for Wireless Security
Computational Intelligence and Security
Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting
Information Security and Cryptology
A Provably Secure One-Pass Two-Party Key Establishment Protocol
Information Security and Cryptology
Deniable Authentication on the Internet
Information Security and Cryptology
Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
A Critical Analysis and Improvement of AACS Drive-Host Authentication
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
Comparing the Pre- and Post-specified Peer Models for Key Agreement
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
An Efficient Deniable Key Exchange Protocol (Extended Abstract)
Financial Cryptography and Data Security
A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort
SCN '08 Proceedings of the 6th international conference on Security and Cryptography for Networks
Identity-based constant round group key exchange protocol via secret-share
WSEAS TRANSACTIONS on SYSTEMS
Dual encryption for query integrity assurance
Proceedings of the 17th ACM conference on Information and knowledge management
An improved identity-based key agreement protocol and its security proof
Information Sciences: an International Journal
A New Formal Proof Model for RFID Location Privacy
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Constructing UC secure and constant-round group key exchange protocols via secret sharing
EURASIP Journal on Wireless Communications and Networking
Enhanced password-based simple three-party key exchange protocol
Computers and Electrical Engineering
A Universally Composable Framework for the Analysis of Browser-Based Security Protocols
ProvSec '08 Proceedings of the 2nd International Conference on Provable Security
Concrete Security for Entity Recognition: The Jane Doe Protocol
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
A Modular Security Analysis of the TLS Handshake Protocol
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
OAEP Is Secure under Key-Dependent Messages
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
User-aided data authentication
International Journal of Security and Networks
A critical analysis and improvement of advanced access content system drive-host authentication
International Journal of Applied Cryptography
Comparing the pre- and post-specified peer models for key agreement
International Journal of Applied Cryptography
An Automated Approach for Proving PCL Invariants
Electronic Notes in Theoretical Computer Science (ENTCS)
A Secure Construction for Threshold Anonymous Password-Authenticated Key Exchange
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Information Systems Frontiers
Designs, Codes and Cryptography
Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
The Swiss-Knife RFID Distance Bounding Protocol
Information Security and Cryptology --- ICISC 2008
Authenticated wireless roaming via tunnels: making mobile guests feel at home
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Universally composable contributory group key exchange
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Partnership in key exchange protocols
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
Key Insulation and Intrusion Resilience over a Public Channel
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
Research of the chinese CAPTCHA system based on AJAX
WSEAS Transactions on Circuits and Systems
Not-a-Bot: improving service availability in the face of botnet attacks
NSDI'09 Proceedings of the 6th USENIX symposium on Networked systems design and implementation
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys
ACNS '09 Proceedings of the 7th International Conference on Applied Cryptography and Network Security
A New Strongly Secure Authenticated Key Exchange Protocol
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps
AFRICACRYPT '09 Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology
Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness
AFRICACRYPT '09 Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology
Towards Denial-of-Service-Resilient Key Agreement Protocols
ACISP '09 Proceedings of the 14th Australasian Conference on Information Security and Privacy
Automatic verification of correspondences for security protocols
Journal of Computer Security
Novel and Efficient Identity-Based Authenticated Key Agreement Protocols from Weil Pairings
UIC '09 Proceedings of the 6th International Conference on Ubiquitous Intelligence and Computing
Two improved two-party identity-based authenticated key agreement protocols
Computer Standards & Interfaces
User-aware provably secure protocols for browser-based mutual authentication
International Journal of Applied Cryptography
Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords
ICCSA '09 Proceedings of the International Conference on Computational Science and Its Applications: Part II
Security Weakness in a Provable Secure Authentication Protocol Given Forward Secure Session Key
ICCSA '09 Proceedings of the International Conference on Computational Science and Its Applications: Part II
Efficient and secure authenticated key exchange using weak passwords
Journal of the ACM (JACM)
A forward-secure e-mail protocol without certificated public keys
Information Sciences: an International Journal
The importance of proofs of security for key establishment protocols
Computer Communications
Multi-party off-the-record messaging
Proceedings of the 16th ACM conference on Computer and communications security
IC card-based single sign-on system that remains secure under card analysis
Proceedings of the 5th ACM workshop on Digital identity management
Deciding security properties for cryptographic protocols. application to key cycles
ACM Transactions on Computational Logic (TOCL)
Enhancement of two-factor authenticated key exchange protocols in public wireless LANs
Computers and Electrical Engineering
Strongly Secure Authenticated Key Exchange without NAXOS' Approach
IWSEC '09 Proceedings of the 4th International Workshop on Security: Advances in Information and Computer Security
ID-Based Group Password-Authenticated Key Exchange
IWSEC '09 Proceedings of the 4th International Workshop on Security: Advances in Information and Computer Security
An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles
ProvSec '09 Proceedings of the 3rd International Conference on Provable Security
Password Authenticated Key Exchange Based on RSA in the Three-Party Settings
ProvSec '09 Proceedings of the 3rd International Conference on Provable Security
Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols
ProvSec '09 Proceedings of the 3rd International Conference on Provable Security
Server-Controlled Identity-Based Authenticated Key Exchange
ProvSec '09 Proceedings of the 3rd International Conference on Provable Security
Verifying Anonymous Credential Systems in Applied Pi Calculus
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
HPAKE: Password Authentication Secure against Cross-Site User Impersonation
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions
ASIACRYPT '09 Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles
Information Security Applications
Securing Remote Access Inside Wireless Mesh Networks
Information Security Applications
Simulatable certificateless two-party authenticated key agreement protocol
Information Sciences: an International Journal
A secure and scalable Group Key Exchange system
Information Processing Letters
Verifier-based password-authenticated key exchange protocol in cross-realm setting
CCDC'09 Proceedings of the 21st annual international conference on Chinese control and decision conference
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security
International Journal of Security and Networks
Parsing ambiguities in authentication and key establishment protocols
International Journal of Electronic Security and Digital Forensics
On the security of a practical identification scheme
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Computationally secure two-round authenticated message exchange
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Authenticated key exchange secure against dictionary attacks
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Provably secure password-authenticated key exchange using Diffie-Hellman
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Provably secure mobile key exchange: applying the Canetti-Krawczyk approach
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
EPA: an efficient password-based protocol for authenticated key exchange
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Intrusion-resilient key exchange in the bounded retrieval model
TCC'07 Proceedings of the 4th conference on Theory of cryptography
(Password) authenticated key establishment: from 2-party to group
TCC'07 Proceedings of the 4th conference on Theory of cryptography
Environmental requirements for authentication protocols
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
ESOP'03 Proceedings of the 12th European conference on Programming
A framework for password-based authenticated key exchange
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Forward secrecy in password-only key exchange protocols
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
Formalizing and analyzing sender invariance
FAST'06 Proceedings of the 4th international conference on Formal aspects in security and trust
On security models and compilers for group key exchange protocols
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
A secure threshold anonymous password-authenticated key exchange protocol
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
Stronger security of authenticated key exchange
ProvSec'07 Proceedings of the 1st international conference on Provable security
On the connection between signcryption and one-pass key establishment
Cryptography and Coding'07 Proceedings of the 11th IMA international conference on Cryptography and coding
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Key distribution in mobile ad hoc networks based on message relaying
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
3-party approach for fast handover in EAP-based wireless networks
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
On the security of a popular web submission and review software (WSaR) for cryptology conferences
WISA'07 Proceedings of the 8th international conference on Information security applications
An efficient password-only two-server authenticated key exchange system
ICICS'07 Proceedings of the 9th international conference on Information and communications security
Multi-factor authenticated key exchange
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Analysis of EAP-GPSK authentication protocol
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Efficient two-party password-based key exchange protocols in the UC framework
CT-RSA'08 Proceedings of the 2008 The Cryptopgraphers' Track at the RSA conference on Topics in cryptology
A secure and efficient three-pass authenticated key agreement protocol based on elliptic curves
NETWORKING'08 Proceedings of the 7th international IFIP-TC6 networking conference on AdHoc and sensor networks, wireless networks, next generation internet
Formal proofs of cryptographic security of Diffie-Hellman-based protocols
TGC'07 Proceedings of the 3rd conference on Trustworthy global computing
SAS-based group authentication and key agreement protocols
PKC'08 Proceedings of the Practice and theory in public key cryptography, 11th international conference on Public key cryptography
Security protocols: principles and calculi tutorial notes
Foundations of security analysis and design IV
An interpretation of identity-based cryptography
Foundations of security analysis and design IV
Faster and shorter password-authenticated key exchange
TCC'08 Proceedings of the 5th conference on Theory of cryptography
Secure protocol for fast authentication in EAP-based wireless networks
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Calibrating the power of schedulers for probabilistic polynomial-time calculus
Journal of Computer Security - Security Issues in Concurrency (SecCo'07)
Computationally sound analysis of a probabilistic contract signing protocol
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Key establishment protocols using environmental and physiological data in wireless sensor networks
International Journal of Sensor Networks
Strong designated verifier signature in a multi-user setting
AISC '09 Proceedings of the Seventh Australasian Conference on Information Security - Volume 98
Provably secure authenticated key exchange protocol under the CDH assumption
Journal of Systems and Software
A communication-efficient three-party password authenticated key exchange protocol
Information Sciences: an International Journal
Two robust remote user authentication protocols using smart cards
Journal of Systems and Software
Private web search with malicious adversaries
PETS'10 Proceedings of the 10th international conference on Privacy enhancing technologies
Modeling leakage of ephemeral secrets in tripartite/group key exchange
ICISC'09 Proceedings of the 12th international conference on Information security and cryptology
A new security model for authenticated key agreement
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
Degrees of security: protocol guarantees in the face of compromising adversaries
CSL'10/EACSL'10 Proceedings of the 24th international conference/19th annual conference on Computer science logic
Modeling and analyzing security in the presence of compromising adversaries
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
Information Sciences: an International Journal
Inductive trace properties for computational security
Journal of Computer Security - 7th International Workshop on Issues in the Theory of Security (WITS'07)
Deniable internet key exchange
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
Towards practical anonymous password authentication
Proceedings of the 26th Annual Computer Security Applications Conference
A security framework for privacy-preserving data aggregation in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
ACISP'10 Proceedings of the 15th Australasian conference on Information security and privacy
Hierarchical ID-based authenticated key exchange resilient to ephemeral key leakage
IWSEC'10 Proceedings of the 5th international conference on Advances in information and computer security
Key management for large-scale distributed storage systems
EuroPKI'09 Proceedings of the 6th European conference on Public key infrastructures, services and applications
Automating computational proofs for public-key-based key exchange
ProvSec'10 Proceedings of the 4th international conference on Provable security
Robust authentication and key agreement scheme preserving the privacy of secret key
Computer Communications
Small trusted primitives for dependable systems
ACM SIGOPS Operating Systems Review
Mutual preimage authentication for fast handover in enterprise networks
OTM'10 Proceedings of the 2010 international conference on On the move to meaningful internet systems - Volume Part I
Strongly secure two-pass attribute-based authenticated key exchange
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
Constructing certificateless encryption and ID-based encryption from ID-based key agreement
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
Predicate-based authenticated key exchange resilient to ephemeral key leakage
WISA'10 Proceedings of the 11th international conference on Information security applications
Relations among privacy notions
ACM Transactions on Information and System Security (TISSEC)
IEEE/ACM Transactions on Networking (TON)
On the minimum communication effort for secure group key exchange
SAC'10 Proceedings of the 17th international conference on Selected areas in cryptography
Designing efficient authenticated key exchange resilient to leakage of ephemeral secret keys
CT-RSA'11 Proceedings of the 11th international conference on Topics in cryptology: CT-RSA 2011
Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols
CT-RSA'11 Proceedings of the 11th international conference on Topics in cryptology: CT-RSA 2011
Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey
Journal of Computer Security
An efficient dynamic authenticated key exchange protocol with selectable identities
Computers & Mathematics with Applications
Strongly secure identity-based authenticated key agreement protocols
Computers and Electrical Engineering
Round-optimal password-based authenticated key exchange
TCC'11 Proceedings of the 8th conference on Theory of cryptography
Provably secure one-round identity-based authenticated asymmetric group key agreement protocol
Information Sciences: an International Journal
Affiliation-hiding authentication with minimal bandwidth consumption
WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication
Secure hash-based password authentication protocol using smartcards
ICCSA'11 Proceedings of the 2011 international conference on Computational science and Its applications - Volume Part V
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
Multi-factor authenticated key exchange protocol in the three-party setting
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
KALwEN+: practical key management schemes for gossip-based wireless medical sensor networks
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
Key exchange in IPsec revisited: formal analysis of IKEv1 and IKEv2
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
ProvSec'11 Proceedings of the 5th international conference on Provable security
Modeling key compromise impersonation attacks on group key exchange protocols
ACM Transactions on Information and System Security (TISSEC)
An authenticated key exchange to improve the security of Shi et al. and Kim et al.'s protocols
WISM'11 Proceedings of the 2011 international conference on Web information systems and mining - Volume Part I
Composition theorems without pre-established session identifiers
Proceedings of the 18th ACM conference on Computer and communications security
Composability of bellare-rogaway key exchange protocols
Proceedings of the 18th ACM conference on Computer and communications security
A formal approach to distance-bounding RFID protocols
ISC'11 Proceedings of the 14th international conference on Information security
Provably secure three-party password-based authenticated key exchange protocol
Information Sciences: an International Journal
A round-optimal three-party ID-based authenticated key agreement protocol
Information Sciences: an International Journal
Characterization of strongly secure authenticated key exchanges without NAXOS technique
IWSEC'11 Proceedings of the 6th International conference on Advances in information and computer security
Computational soundness about formal encryption in the presence of secret shares and key cycles
ICICS'11 Proceedings of the 13th international conference on Information and communications security
An improved two-party identity-based authenticated key agreement protocol using pairings
Journal of Computer and System Sciences
A scalable password-based group key exchange protocol in the standard model
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
Password based key exchange with mutual authentication
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
Deniable authenticated key establishment for internet protocols
Proceedings of the 11th international conference on Security Protocols
Towards provably secure group key agreement building on group theory
VIETCRYPT'06 Proceedings of the First international conference on Cryptology in Vietnam
Cryptanalysis of two provably secure cross-realm C2C-PAKE protocols
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
Deciding key cycles for security protocols
LPAR'06 Proceedings of the 13th international conference on Logic for Programming, Artificial Intelligence, and Reasoning
Cryptanalysis of ID-based authenticated key agreement protocols from bilinear pairings (short paper)
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Computationally sound symbolic secrecy in the presence of hash functions
FSTTCS'06 Proceedings of the 26th international conference on Foundations of Software Technology and Theoretical Computer Science
An authentication protocol for pervasive computing
ISPA'05 Proceedings of the Third international conference on Parallel and Distributed Processing and Applications
Modular security proofs for key agreement protocols
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Examining indistinguishability-based proof models for key establishment protocols
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Errors in computational complexity proofs for protocols
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
On session key construction in provably-secure key establishment protocols
Mycrypt'05 Proceedings of the 1st international conference on Progress in Cryptology in Malaysia
Security of two-party identity-based key agreement
Mycrypt'05 Proceedings of the 1st international conference on Progress in Cryptology in Malaysia
On the security of the canetti-krawczyk model
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Probabilistic polynomial-time semantics for a protocol security logic
ICALP'05 Proceedings of the 32nd international conference on Automata, Languages and Programming
On the role definitions in and beyond cryptography
ASIAN'04 Proceedings of the 9th Asian Computing Science conference on Advances in Computer Science: dedicated to Jean-Louis Lassez on the Occasion of His 5th Cycle Birthday
Interactive diffie-hellman assumptions with applications to password-based authentication
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
ID-based authenticated key agreement for low-power mobile devices
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
On the resilience of key agreement protocols to key compromise impersonation
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
Two-server password-only authenticated key exchange
Journal of Computer and System Sciences
On bluetooth repairing: key agreement based on symmetric-key cryptography
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
Session corruption attack and improvements on encryption based MT-Authenticators
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
An optimal non-interactive message authentication protocol
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
A simulation-based treatment of authenticated message exchange
ASIAN'09 Proceedings of the 13th Asian conference on Advances in Computer Science: information Security and Privacy
Identity-based key agreement with unilateral identity privacy using pairings
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
Password-Based authenticated key exchange in the three-party setting
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
RSA with balanced short exponents and its application to entity authentication
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
Two-Server password-only authenticated key exchange
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
N-Party encrypted diffie-hellman key exchange using different passwords
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Intrusion-Resilient secure channels
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Efficient and leakage-resilient authenticated key transport protocol based on RSA
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Efficient anonymous roaming and its security analysis
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Justifying a dolev-yao model under active attacks
Foundations of Security Analysis and Design III
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Foundations of group signatures: the case of dynamic groups
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
Simple password-based encrypted key exchange protocols
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
Hard bits of the discrete log with applications to password authentication
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
A new two-party identity-based authenticated key agreement
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
The relationship between password-authenticated key exchange and other cryptographic primitives
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
A lower-bound of complexity for RSA-Based password-authenticated key exchange
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
Secure communications over insecure channels based on short authenticated strings
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
HMQV: a high-performance secure diffie-hellman protocol
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Secure remote authentication using biometric data
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Universally composable password-based key exchange
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Browser model for security analysis of browser-based protocols
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Securely propagating authentication in an ensemble of personal devices using single sign-on
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Design of secure key establishment protocols: successes, failures and prospects
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
A lightweight secure mobile Payment protocol for vehicular ad-hoc networks (VANETs)
Electronic Commerce Research
Security properties of two authenticated conference key agreement protocols
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Cryptographically sound security proofs for basic and public-key kerberos
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Deriving secrecy in key establishment protocols
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
A deniable group key establishment protocol in the standard model
ISPEC'10 Proceedings of the 6th international conference on Information Security Practice and Experience
About the security of MTI/C0 and MQV
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
A new key exchange protocol based on MQV assuming public computations
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
A method for making password-based key exchange resilient to server compromise
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
Mitigating dictionary attacks on password-protected local storage
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
Flexible group key exchange with on-demand computation of subgroup keys
AFRICACRYPT'10 Proceedings of the Third international conference on Cryptology in Africa
Security analysis of KEA authenticated key exchange protocol
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
SAS-Based authenticated key agreement
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
A framework for robust group key agreement
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
Password based server aided key exchange
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
An extension to bellare and rogaway (1993) model: resetting compromised long-term keys
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
Secure cross-realm C2C-PAKE protocol
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
Provably-Secure two-round password-authenticated group key exchange in the standard model
IWSEC'06 Proceedings of the 1st international conference on Security
A diffie-hellman key exchange protocol without random oracles
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Efficient mutual data authentication using manually authenticated strings
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Efficient password-authenticated key exchange based on RSA
CT-RSA'07 Proceedings of the 7th Cryptographers' track at the RSA conference on Topics in Cryptology
Key exchange with anonymous authentication using DAA-SIGMA protocol
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
Security weakness in ren et al.'s group key agreement scheme built on secure two-party protocols
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Key exchange using passwords and long keys
TCC'06 Proceedings of the Third conference on Theory of Cryptography
Universally composable symbolic analysis of mutual authentication and key-exchange protocols
TCC'06 Proceedings of the Third conference on Theory of Cryptography
Constant-Round password-based group key generation for multi-layer ad-hoc networks
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
Efficient authenticators with application to key exchange
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
A new spin on quantum cryptography: avoiding trapdoors and embracing public keys
PQCrypto'11 Proceedings of the 4th international conference on Post-Quantum Cryptography
Authenticated key exchange under bad randomness
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
SAC'11 Proceedings of the 18th international conference on Selected Areas in Cryptography
Analysis of the SSH key exchange protocol
IMACC'11 Proceedings of the 13th IMA international conference on Cryptography and Coding
On forward secrecy in one-round key exchange
IMACC'11 Proceedings of the 13th IMA international conference on Cryptography and Coding
CANS'11 Proceedings of the 10th international conference on Cryptology and Network Security
Towards a provably secure dos-resilient key exchange protocol with perfect forward secrecy
INDOCRYPT'11 Proceedings of the 12th international conference on Cryptology in India
A provably secure authenticated key agreement protocol for wireless communications
Computers and Electrical Engineering
Research note: Group-oriented authentication mechanism with key exchange
Computer Communications
Security protocol verification: symbolic and computational models
POST'12 Proceedings of the First international conference on Principles of Security and Trust
Provably repairing the ISO/IEC 9798 standard for entity authentication
POST'12 Proceedings of the First international conference on Principles of Security and Trust
Mutual authentication and group key agreement for low-power mobile devices
Computer Communications
Timed encryption with application to deniable key exchange
TAMC'12 Proceedings of the 9th Annual international conference on Theory and Applications of Models of Computation
Password-Based authenticated key exchange
PKC'12 Proceedings of the 15th international conference on Practice and Theory in Public Key Cryptography
Strongly secure authenticated key exchange from factoring, codes, and lattices
PKC'12 Proceedings of the 15th international conference on Practice and Theory in Public Key Cryptography
A complementary analysis of the (s)YZ and DIKE protocols
AFRICACRYPT'12 Proceedings of the 5th international conference on Cryptology in Africa
Sufficient condition for ephemeral key-leakage resilient tripartite key exchange
ACISP'12 Proceedings of the 17th Australasian conference on Information Security and Privacy
ICISC'11 Proceedings of the 14th international conference on Information Security and Cryptology
An efficient certificateless two-party authenticated key agreement protocol
Computers & Mathematics with Applications
Inductive proofs of computational secrecy
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
An efficient ID-based authenticated key agreement protocol with pairings
ISPA'07 Proceedings of the 5th international conference on Parallel and Distributed Processing and Applications
Strongly-secure identity-based key agreement and anonymous extension
ISC'07 Proceedings of the 10th international conference on Information Security
Efficient and dynamic key management for multiple identities in identity-based systems
Information Sciences: an International Journal
Strongly authenticated key exchange protocol from bilinear groups without random oracles
ProvSec'12 Proceedings of the 6th international conference on Provable Security
Authenticated key exchange with entities from different settings and varied groups
ProvSec'12 Proceedings of the 6th international conference on Provable Security
Strongly secure attribute-based authenticated key exchange with traceability
WISM'12 Proceedings of the 2012 international conference on Web Information Systems and Mining
How not to prove yourself: pitfalls of the fiat-shamir heuristic and applications to helios
ASIACRYPT'12 Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security
Computational soundness of coinductive symbolic security under active attacks
TCC'13 Proceedings of the 10th theory of cryptography conference on Theory of Cryptography
Sessions and separability in security protocols
POST'13 Proceedings of the Second international conference on Principles of Security and Trust
Anonymity and one-way authentication in key exchange protocols
Designs, Codes and Cryptography
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Provably secure three party encrypted key exchange scheme with explicit authentication
Information Sciences: an International Journal
Provably secure certificateless one-way and two-party authenticated key agreement protocol
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
Towards a secure human-and-computer mutual authentication protocol
AISC '12 Proceedings of the Tenth Australasian Information Security Conference - Volume 125
On the security of TLS renegotiation
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
An analysis of the EMV channel establishment protocol
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
A secure channel for attribute-based credentials: [short paper]
Proceedings of the 2013 ACM workshop on Digital identity management
Exposure-resilient one-round tripartite key exchange without random oracles
ACNS'13 Proceedings of the 11th international conference on Applied Cryptography and Network Security
Personal and Ubiquitous Computing
The Journal of Supercomputing
Journal of Medical Systems
Security weaknesses of a signature scheme and authenticated key agreement protocols
Information Processing Letters
Hi-index | 0.00 |