Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys

Lihua Wang, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto. Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys. In Yue Hao, Jiming Liu, Yuping Wang, Yiu-ming Cheung, Hujun Yin, Licheng Jiao, Jianfeng Ma, Yong-Chang Jiao, editors, Computational Intelligence and Security, International Conference, CIS 2005, Xi an, China, December 15-19, 2005, Proceedings, Part II. Volume 3802 of Lecture Notes in Computer Science, pages 198-203, Springer, 2005. [doi]

@inproceedings{WangOTO05,
  title = {Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys},
  author = {Lihua Wang and Takeshi Okamoto and Tsuyoshi Takagi and Eiji Okamoto},
  year = {2005},
  doi = {10.1007/11596981_30},
  url = {http://dx.doi.org/10.1007/11596981_30},
  tags = {protocol},
  researchr = {https://researchr.org/publication/WangOTO05},
  cites = {0},
  citedby = {0},
  pages = {198-203},
  booktitle = {Computational Intelligence and Security, International Conference, CIS 2005, Xi an, China, December 15-19, 2005, Proceedings, Part II},
  editor = {Yue Hao and Jiming Liu and Yuping Wang and Yiu-ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong-Chang Jiao},
  volume = {3802},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {3-540-30819-9},
}