A Practical and Secure Fault-Tolerant Conference-Key Agreement Protocol, IEEE Transactions on Computers, vol.51, issue.4, pp.373-379, 2002. ,
DOI : 10.1007/978-3-540-46588-1_1
An improved conference-key agreement protocol for dynamic groups with efficient fault correction, Security and Communication Networks, vol.13, issue.7, pp.1347-1359, 2015. ,
DOI : 10.1016/j.jss.2009.02.006
A communication-efficient and fault-tolerant conference-key agreement protocol with forward secrecy, Journal of Systems and Software, vol.80, issue.7, pp.1091-1101, 2007. ,
DOI : 10.1016/j.jss.2006.10.053
An architecture for key management in hierarchical mobile ad-hoc networks, Journal of Communications and Networks, vol.6, issue.2, pp.1-7, 2004. ,
DOI : 10.1109/JCN.2004.6596636
Authenticated Key Exchange Secure against Dictionary Attacks, Proc. Advances in Cryptology ? Eurocrypt'00, pp.139-155, 2000. ,
DOI : 10.1007/3-540-45539-6_11
A Robust Multi-Party Key Agreement Protocol Resistant to Malicious Participants, The Computer Journal, vol.48, issue.4, pp.480-487, 2005. ,
DOI : 10.1093/comjnl/bxh111
Modelling insider attacks on group key exchange protocols, ACM Conf. on Computer and Communications Security, pp.180-189, 2005. ,
DOI : 10.1145/1102120.1102146
Security Properties of Two Authenticated Conference Key Agreement Protocols, Information and Communications Security: 7th Int. Conf., ICICS 2005, pp.304-314, 2005. ,
DOI : 10.1007/11602897_26
URL : http://eprint.iacr.org/2005/185.pdf
The design of authentication key protocol in certificate-free public key cryptosystem, Security Communication Networks, pp.2125-2133, 2013. ,
DOI : 10.1109/TIT.2008.920224
A fault-tolerant group key agreement protocol exploiting dynamic setting, International Journal of Communication Systems, vol.23, issue.2, pp.259-275, 2013. ,
DOI : 10.1002/dac.1095
An efficient fault-tolerant group key agreement protocol, Computer Communications, vol.33, issue.7, pp.890-895, 2010. ,
DOI : 10.1016/j.comcom.2010.01.001
A conference key agreement protocol with fault-tolerant capability, Computer Standards & Interfaces, vol.31, issue.2, pp.401-405, 2009. ,
DOI : 10.1016/j.csi.2008.05.015
Asymmetric Group Key Agreement, Advances in Cryptography -EUROCRYPT 2009, pp.153-170 ,
DOI : 10.1007/3-540-44448-3_47
Improvement on the fault-tolerant group key agreement protocol of Zhao et al. Security Communication Networks, pp.166-170, 2016. ,
Scalable Protocols for Authenticated Group Key Exchange, Journal of Cryptology, vol.20, issue.1, pp.85-113, 2007. ,
DOI : 10.1007/s00145-006-0361-5
An improved conference-key agreement protocol with forward secrecy, Informatica Lithuania Academy of Sciences, vol.16, pp.275-284, 2005. ,
Basics of Contemporary Cryptography for IT Practioners, 2005. ,
Introduction to Modern Cryptography: Principles and Protocols, CRC, 2007. ,
Galindo-Garcia Identity-Based Signature Revisited, Information Security and Cryptology ? ICISC 2012, pp.456-471, 2013. ,
DOI : 10.1007/978-3-642-37682-5_32
URL : http://eprint.iacr.org/2012/646.pdf
A Closer Look at Multiple Forking: Leveraging (In)Dependence for a Tighter Bound, Algorithmica, vol.4, issue.2, pp.1-42, 2015. ,
DOI : 10.1007/978-3-642-29011-4_33
An Enhanced Fault-Tolerant Conference Key Agreement Protocol, International Journal of Computer, Electrical, Automation, Control and Information Engineering, vol.8, issue.12, pp.2231-2235, 2014. ,
Practical authentication protocols for protecting and sharing sensitive information on mobile devices ,
Protection Profile for Secure Sensitive Information System on Mobile Devices, CISIM 2014, pp.636-650, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01405659
Certificate-Based Encryption Scheme with General Access Structure, CISIM 2012, pp.41-55, 2012. ,
DOI : 10.1007/978-3-642-33260-9_3
URL : https://hal.archives-ouvertes.fr/hal-01551717
A Practical Certificate and Identity Based Encryption Scheme and Related Security Architecture, CISIM 2013, pp.178-193, 2013. ,
DOI : 10.1007/978-3-642-40925-7_19
URL : https://hal.archives-ouvertes.fr/hal-01496066
Implicit and Explicit Certificates-Based Encryption Scheme, CISIM 2014, pp.651-666, 2014. ,
DOI : 10.1007/978-3-642-33260-9_3
URL : https://hal.archives-ouvertes.fr/hal-01405660