SEARCH

SEARCH BY CITATION

References

  • 1
    Toorani M. SMEmail - a new protocol for the secure e-mail in mobile environments, Proceedings of the Australian Telecommunications Networks and Applications Conference (ATNAC'08), Dec. 2008; pp. 3944.
  • 2
    Toorani M, Beheshti A. An elliptic curve-based signcryption scheme with forward secrecy. Journal of Applied Sciences 2009; 9(6):10251035.
  • 3
    Chang CC, Lee CY, Chiu YC. An efficient e-mail protocol providing perfect forward secrecy for mobile devices. International Journal of Communication Systems 2010; 23(12):14631473.
  • 4
    Kim BH, Koo JH, Lee DH. Robust e-mail protocols with perfect forward secrecy. IEEE Communications Letters 2006; 10:510512.
  • 5
    Kwon JO, Jeong IR, Lee DH. A forward-secure e-mail protocol without certificated public keys. Information Sciences 2009; 179:42274231.
  • 6
    Lin IC, Lin YB, Wang CM. An improvement on secure e-mail protocols providing perfect forward secrecy, in 9th Joint Conference on Information Sciences, 2006; pp. 697700.
  • 7
    Sun H-M, Hsieh B-T, Hwang H-J. Secure e-mail protocols providing perfect forward secrecy. IEEE Communications Letters 2005; 9:5860.
  • 8
    Chen HC. Secure multicast key protocol for electronic mail systems with providing perfect forward secrecy. Security and Communication Networks 2013; 6:100107.
  • 9
    Dent AW. Flaws in an e-mail protocol of Sun, Hsieh, and Hwang. IEEE Communications Letters 2005; 9:718719.
  • 10
    Phan RC-W. Cryptanalysis of e-mail protocols providing perfect forward secrecy. Computer Standards & Interfaces 2008; 30:101105.
  • 11
    Yoon EJ, Yoo KY. Cryptanalysis of robust e-mail protocols with perfect forward secrecy. IEEE Communications Letters 2007; 11:372374.
  • 12
    Chen T-h, Wu Y-t. A new protocol of wide use for e-mail with perfect forward secrecy. Journal of Zhejiang University-SCIENCE C (Computers & Electronics) 2010; 11:7478.
  • 13
    Byun J, Jeong I, Lee D, Park CS. Password-authenticated key exchange between clients with different passwords. In Proceedings of 4th International Conference on Information and Communications Security (ICICS'02), LNCS 2513, (ed). Springer Berlin Heidelberg: Singapore, 2002; pp. 134146.
  • 14
    Byun JW, Lee DH, Lim JI. EC2C-PAKA: an efficient client-to-client password-authenticated key agreement. Information Sciences 2007; 177:39954013.
  • 15
    Feng DG, Xu J. A new client-to-client password-authenticated key agreement protocol. In Proceedings of Second International Workshop on Coding and Cryptology (IWCC 2009), LNCS 5557, Springer Berlin Heidelberg: Zhangjiajie, China, 2009: pp. 6376.
  • 16
    Gang Y, Dengguo F, Xiaoxi H. Improved client-to-client password-authenticated key exchange protocol. In Proceedings of Second International Conference on Availability, Reliability and Security (ARES'07), 2007; pp. 564574.
  • 17
    Wang S, Wang J, Xu M. Weaknesses of a password-authenticated key exchange protocol between clients with different passwords. In Proceedings of Second International Conference on Applied Cryptography and Network Security (ACNS'04), LNCS 3089, Springer Berlin Heidelberg: Yellow Mountain, China, 2004; pp. 414425.
  • 18
    Bellovin SM. Merritt M. Encrypted key exchange: password-based protocols secure against dictionary attacks. In Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy, 1992; pp. 7284.
  • 19
    Yoneyama K, Ota H, Ohta K. Secure cross-realm client-to-client password-based authenticated key exchange against undetectable on-line dictionary attacks. In Proceedings of 17th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes (AAECC-17), LNCS 4851, Springer Berlin Heidelberg: Bangalore, India, 2007; pp. 257266.