Author:
Naor Moni,Rotem Lior,Segev Gil
Publisher
Springer International Publishing
Reference49 articles.
1. Alghamdi, D., Flechais, I., Jirotka, M.: Security practices for households bank customers in the kingdom of Saudi Arabia. In: Symposium on Usable Privacy and Security (SOUPS), pp. 297–308 (2015)
2. Besnard, D., Arief, B.: Computer security impaired by legitimate users. Comput. Secur. 23(3), 253–264 (2004)
3. Barak, B.: Constant-round coin-tossing with a man in the middle or realizing the shared random string model. In: Proceedings of the 43rd Annual IEEE Symposium on Foundations of Computer Science, pp. 345–355 (2002)
4. Bellovin, S.M., Merritt, M.: An attack on the interlock protocol when used for authentication. IEEE Trans. Inf. Theor. 40(1), 273–275 (1994)
5. Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, pp. 62–73 (1993)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献