1 |
M. Cagalj and J.-P. Hubaux, "Key agreement over a radio link," EPFL-IC-ICA, Tech. Rep. IC/2004/16, Jan. 2004
|
2 |
박선영, 김주영, 송홍엽, "Design of improved DH (Diffie-Hellman) key agreement protocol based on distance bounding for peer-to-peer wireless networks," 2007 제 17회 통신정보 합동학술대회 (JCCI), 보광 휘닉스파크, 2007년 5월 2-4일
|
3 |
J.-F. Raymond and A. Stiglic, "Security Issues in the Diffie-Hellman Key Agreement Protocol," Sep. 2000. (http://citeseer.nj.nec.com/453885.html)
|
4 |
M. Cagalj, S. Capkun and J.-P. Hubaux, "Key agreement in peer-to-peer wireless networks," Proceedings of IEEE, Vol. 94, Issue 2, Feb. 2006
|
5 |
S. Brands and D. Chaum, "Distance-bounding protocols," in EUROCRYPT. Heidelberg, Germany: Springer-Verlag, 1993, vol. 765, Lecture Notes in Computer Science, pp. 344-359
|
6 |
M. Bellare and P. Rogaway, Random Oracles are Practical: A Paradigm for Designing Efficient Protocols, ACM Conference on Computer and Communications Security 1993
|
7 |
A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, CRC press, 1997
|
8 |
W. Diffie and M. Hellman, "New Directions in Cryptography," IEEE Transaction on Information Theory, 1976
|
9 |
S. Halevi and S. Micali, "Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing," In N. Koblitz, editor, Advances in Cryptology-CRYPTO 96, pages 201-215, Lecture Notes in Computer Science, Springer-Verlag, 1996
|