The following publications are possibly variants of this publication:
- Three-party encrypted key exchange without server public-keysChun-Li Lin, Hung-Min Sun, Michael Steiner, Tzonelih Hwang. icl, 5(12):497-499, 2001. [doi]
- Simple password-based three-party authenticated key exchange without server public keysTian-Fu Lee, Tzonelih Hwang. isci, 180(9):1702-1714, 2010. [doi]
- Secure Verifier-Based Three-Party Authentication Schemes without Server Public Keys for Data Exchange in Telecare Medicine Information SystemsTsung-Hung Lin, Tian-Fu Lee. jms, 38(5):30, 2014. [doi]
- Three-party Encrypted Key Exchange: Attacks and A SolutionChun-Li Lin, Hung-Min Sun, Tzonelih Hwang. sigops, 34(4):12-20, 2000.
- Efficient verifier-based key agreement protocol for three parties without server s public keySung-Woon Lee, Hyun-Sung Kim, Kee-Young Yoo. amc, 167(2):996-1003, 2005. [doi]
- Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacksHsing-Bai Chen, Tzungher Chen, Wei-Bin Lee, Chin-Chen Chang. csi, 30(1-2):95-99, 2008. [doi]