1 |
D. Balfanz, G. Durfee, N. Shankar, D.K. Smetters, J. Staddon, and H.C. Wong, "Secret handshakes from pairing-based key agreements," Proceedings of 2003 IEEE Symposium on Security and Privacy, pp. 180-196, May 2003.
|
2 |
J. Gu and Z. Xue, "An Improved Efficient Secret Handshakes Scheme with Unlinkability," IEEE Communications Letters, vol. 15, no. 2, pp. 259-261, Feb. 2011.
DOI
|
3 |
H. Huang and Z. Cao, "A Novel and Efficient Unlinkable Secret Handshakes Scheme," IEEE Communications Letters, vol. 13, no. 5, pp. 363-365, May 2009.
DOI
|
4 |
S. Jarecki, J. Kim, and G. Tsudik, "Beyond secret handshakes: affiliation-hiding authenticated key exchange," Proceedings of CT-RSA'08, LNCS 4964, pp. 352-369, 2008.
|
5 |
S. Jarecki and X. Liu, "Unlinkable secret handshakes and key-privacy in group key management scheme," Proceedings of ACNS'07, LNCS 4521, pp. 270-287, 2007.
|
6 |
R. Su, "On the security of a novel and efficient unlinkable secret handshakes scheme," IEEE Communications Letters, vol. 13, no. 9, pp. 712-713, Sep. 2009.
DOI
|
7 |
T.-Y. Youn and Y.-H. Park, "Security analysis of an unlinkable secret handshakes scheme," IEEE Communications Letters, vol. 14, no. 1, pp. 4-5, Jan. 2010.
DOI
|