Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys

Lihua Wang, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto. Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys. In Yue Hao, Jiming Liu, Yuping Wang, Yiu-ming Cheung, Hujun Yin, Licheng Jiao, Jianfeng Ma, Yong-Chang Jiao, editors, Computational Intelligence and Security, International Conference, CIS 2005, Xi an, China, December 15-19, 2005, Proceedings, Part II. Volume 3802 of Lecture Notes in Computer Science, pages 198-203, Springer, 2005. [doi]

Authors

Lihua Wang

This author has not been identified. Look up 'Lihua Wang' in Google

Takeshi Okamoto

This author has not been identified. Look up 'Takeshi Okamoto' in Google

Tsuyoshi Takagi

This author has not been identified. Look up 'Tsuyoshi Takagi' in Google

Eiji Okamoto

This author has not been identified. Look up 'Eiji Okamoto' in Google