On the security of some password-based key agreement schemes. / Tang, Qiang; Mitchell, Chris J.

Computational Intelligence and Security: International Conference, CIS 2005, Xi'an, China, December 15-19 2005, Proceedings, Part II. ed. / Y Hao; J Liu; Y Wang; Y Cheung; H Yin; L Jiao; J Ma; Y Jiao. Vol. 3802 Springer-Verlag, 2005. p. 149-154 (Lecture Notes in Computer Science; Vol. 3802).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Published

Standard

On the security of some password-based key agreement schemes. / Tang, Qiang; Mitchell, Chris J.

Computational Intelligence and Security: International Conference, CIS 2005, Xi'an, China, December 15-19 2005, Proceedings, Part II. ed. / Y Hao; J Liu; Y Wang; Y Cheung; H Yin; L Jiao; J Ma; Y Jiao. Vol. 3802 Springer-Verlag, 2005. p. 149-154 (Lecture Notes in Computer Science; Vol. 3802).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Harvard

Tang, Q & Mitchell, CJ 2005, On the security of some password-based key agreement schemes. in Y Hao, J Liu, Y Wang, Y Cheung, H Yin, L Jiao, J Ma & Y Jiao (eds), Computational Intelligence and Security: International Conference, CIS 2005, Xi'an, China, December 15-19 2005, Proceedings, Part II. vol. 3802, Lecture Notes in Computer Science, vol. 3802, Springer-Verlag, pp. 149-154.

APA

Tang, Q., & Mitchell, C. J. (2005). On the security of some password-based key agreement schemes. In Y. Hao, J. Liu, Y. Wang, Y. Cheung, H. Yin, L. Jiao, J. Ma, & Y. Jiao (Eds.), Computational Intelligence and Security: International Conference, CIS 2005, Xi'an, China, December 15-19 2005, Proceedings, Part II (Vol. 3802, pp. 149-154). (Lecture Notes in Computer Science; Vol. 3802). Springer-Verlag.

Vancouver

Tang Q, Mitchell CJ. On the security of some password-based key agreement schemes. In Hao Y, Liu J, Wang Y, Cheung Y, Yin H, Jiao L, Ma J, Jiao Y, editors, Computational Intelligence and Security: International Conference, CIS 2005, Xi'an, China, December 15-19 2005, Proceedings, Part II. Vol. 3802. Springer-Verlag. 2005. p. 149-154. (Lecture Notes in Computer Science).

Author

Tang, Qiang ; Mitchell, Chris J. / On the security of some password-based key agreement schemes. Computational Intelligence and Security: International Conference, CIS 2005, Xi'an, China, December 15-19 2005, Proceedings, Part II. editor / Y Hao ; J Liu ; Y Wang ; Y Cheung ; H Yin ; L Jiao ; J Ma ; Y Jiao. Vol. 3802 Springer-Verlag, 2005. pp. 149-154 (Lecture Notes in Computer Science).

BibTeX

@inproceedings{fd3b36b47f3d4d26bebe6cb229dcf787,
title = "On the security of some password-based key agreement schemes",
author = "Qiang Tang and Mitchell, {Chris J}",
year = "2005",
language = "English",
volume = "3802",
series = "Lecture Notes in Computer Science",
publisher = "Springer-Verlag",
pages = "149--154",
editor = "Y Hao and J Liu and Y Wang and Y Cheung and H Yin and L Jiao and J Ma and Y Jiao",
booktitle = "Computational Intelligence and Security: International Conference, CIS 2005, Xi'an, China, December 15-19 2005, Proceedings, Part II",

}

RIS

TY - GEN

T1 - On the security of some password-based key agreement schemes

AU - Tang, Qiang

AU - Mitchell, Chris J

PY - 2005

Y1 - 2005

M3 - Conference contribution

VL - 3802

T3 - Lecture Notes in Computer Science

SP - 149

EP - 154

BT - Computational Intelligence and Security: International Conference, CIS 2005, Xi'an, China, December 15-19 2005, Proceedings, Part II

A2 - Hao, Y

A2 - Liu, J

A2 - Wang, Y

A2 - Cheung, Y

A2 - Yin, H

A2 - Jiao, L

A2 - Ma, J

A2 - Jiao, Y

PB - Springer-Verlag

ER -