1. Y. P. Wu, A. Khisti, C. Xiao,W. Giuseppe, “A Survey of Physical Layer Security Techniques for 5g Wireless Networks and Challenges Ahead,” IEEE Journal on Selected Areas in Communications, Vol. 36, No. 4, pp. 679-695, January 2018 2. L. Jie, U. Twesh,L. Norbert, “Asymptotic Security Analysis of Discrete-Modulated Continuous-Variable Quantum Key Distribution,” Physical Review X, Vol. 9, No. 4, pp. 1-12, May 2019 3. B. Katharina and W. Leroy, “Why so Serious? Theorizing Playful Model-Driven Group Decision Support with Situated Affectivity,” Group Decision and Negotiation, Vol. 18, No. 1, pp. 1-22, February 2018 4. Z. Jian, G. Dawu,L. Yali, “An Efficient Fault-Tolerant Group Key Agreement Protocol,” Computer Communications, Vol. 33, No. 7, pp. 890-895, May 2010 5. T. Dutta, “A Secure Authenticated Group Key Agreement Protocol for Resource-Limited Mobile Devices,” The Computer Journal, Vol. 50, No. 1, pp. 1-12, January 2007 6. E. Bresson, C. Olivier,P. David, “Group Diffie-Hellman Key Exchange Secure Against Dictionary Attacks,” inProceedings of Advances in Cryptology - ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, pp. 23-30, Queenstown, New Zealand, December 2002 7. K. Xue, P. Hong,C. Ma, “A Lightweight Dynamic Pseudonym Identity based Authentication and Key Agreement Protocol Without Verification Tables for Multi-Server Architecture,” Journal of Computer and System Sciences, Vol. 80, No. 1, pp. 195-206, April 2012 8. F. L. Wang, F. Liu,Y. M. Zhao, “A Novel Approach of High Accuracy Analysis of Anisotropic Bilinear Finite Element for Time-Fractional Diffusion Equations with Variable Coefficient,” Computers Mathematics with Applications, Vol. 75, No. 10, pp. 3786-3800, March 2018 9. Y. Eun and Y. Kee-Young, “Robust Biometrics-based Multi-Server Authentication with Key Agreement Scheme for Smart Cards on Elliptic Curve Cryptosystem,” Journal of Supercomputing, Vol. 63, No. 1, pp. 235-255, January 2010 10. S. Kiing, “Vulnerabilities of Generalized MQV Key Agreement Protocol Without using One-Way Hash Functions,” Computer Standards and Interfaces, Vol. 29, No. 4, pp. 467-470, May 2007 11. H. Pan and S. Steven, “Bilinear Magneto-Electric Resistance as a Probe of Three-Dimensional Spin Texture in Topological Surface States,” Nature Physics, Vol. 14, No. 5, pp. 1-13, May 2018 12. X. Yao and Z. Chen, “A Lightweight Attribute-based Encryption Scheme for the Internet of Things,” Future Generation Computer Systems, Vol. 49, No. 1, pp. 104-112, October 2018 13. D. Bakkiam and D. Rajappa, “Analyzing Secure Key Authentication and Key Agreement Protocol for Promising Features of IP Multimedia Subsystem using IP Multimedia Server-Client Systems,” Multimedia Tools and Applications, Vol. 75, No. 4, pp. 2111-2143, December 2016 14. G. Hua and L. Zhoujun, “Provably Secure Identity-based Authenticated Key Agreement Protocols with Malicious Private Key Generators,” Information Sciences, Vol. 181, No. 3, pp. 628-647, February 2011 15. Z. Peng, B. Kaigui,Z. Tong, “Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions,” IEEE Transactions on Mobile Computing, Vol. 16, No. 2, pp. 1-13, January 2016 |