{\rtf1\ansi\deff0\deftab360

{\fonttbl
{\f0\fswiss\fcharset0 Arial}
{\f1\froman\fcharset0 Times New Roman}
{\f2\fswiss\fcharset0 Verdana}
{\f3\froman\fcharset2 Symbol}
}

{\colortbl;
\red0\green0\blue0;
}

{\info
{\author Biblio 7.x}{\operator }{\title Biblio RTF Export}}

\f1\fs24
\paperw11907\paperh16839
\pgncont\pgndec\pgnstarts1\pgnrestart
"Provably Secure Three-party Password-based Authenticated Key Exchange Protocol Using Weil Pairing." \i IEE Proceedings Communication\i0  152, no. 2 (2005).\par \par Lin, Chun-Li, Tzonelih Hwang, and Hung-Min Sun. "Three-Party Encrypted Key Exchange: Attacks and a Solution." \i ACM Operating Systems Review\i0  34, no. 4 (2000): 12-20.\par \par Sun, Hung-Min, Tzonelih Hwang, and Narn-Yih Lee. \i Nonrepudiable Threshold Proxy Signatures\i0  In \i 9th National Conference on Information Security\i0 . Taiwan, 1999.\par \par Lee, Narn-Yih, and Tzonelih Hwang. "On the Security of Fair Blind Signature Scheme Using Oblivious Transfer." \i Computer Communications\i0  22, no. 3 (1999): 287-290.\par \par Sun, Hung-Min, Tzonelih Hwang, and Narn-Yih Lee. "Threshold Proxy Signatures." \i IEE Proceedings- Computers and Digital Techniques\i0  146, no. 5 (1999): 259-263.\par \par "\i Non-Interactive Password Authentication without Password Tables\i0 ." In \i EEE 10th Regional Conference on Computer and Communication Systems\i0 ., 1990.\par \par }