Lihua Wang, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto. Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys. In Yue Hao, Jiming Liu, Yuping Wang, Yiu-ming Cheung, Hujun Yin, Licheng Jiao, Jianfeng Ma, Yong-Chang Jiao, editors, Computational Intelligence and Security, International Conference, CIS 2005, Xi an, China, December 15-19, 2005, Proceedings, Part II. Volume 3802 of Lecture Notes in Computer Science, pages 198-203, Springer, 2005. [doi]
@inproceedings{WangOTO05, title = {Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys}, author = {Lihua Wang and Takeshi Okamoto and Tsuyoshi Takagi and Eiji Okamoto}, year = {2005}, doi = {10.1007/11596981_30}, url = {http://dx.doi.org/10.1007/11596981_30}, tags = {protocol}, researchr = {https://researchr.org/publication/WangOTO05}, cites = {0}, citedby = {0}, pages = {198-203}, booktitle = {Computational Intelligence and Security, International Conference, CIS 2005, Xi an, China, December 15-19, 2005, Proceedings, Part II}, editor = {Yue Hao and Jiming Liu and Yuping Wang and Yiu-ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong-Chang Jiao}, volume = {3802}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-30819-9}, }