How to Construct Secure and Efficient Three-Party Password-Based Authenticated Key Exchange Protocols

Weijia Wang, Lei Hu, Yong Li 0002. How to Construct Secure and Efficient Three-Party Password-Based Authenticated Key Exchange Protocols. In Xuejia Lai, Moti Yung, Dongdai Lin, editors, Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers. Volume 6584 of Lecture Notes in Computer Science, pages 218-235, Springer, 2010. [doi]

Authors

Weijia Wang

This author has not been identified. Look up 'Weijia Wang' in Google

Lei Hu

This author has not been identified. Look up 'Lei Hu' in Google

Yong Li 0002

This author has not been identified. Look up 'Yong Li 0002' in Google