Author:
Paladi Nicolae,Tiloca Marco,Nikbakht Bideh Pegah,Hell Martin
Publisher
Springer International Publishing
Reference53 articles.
1. Greenberg, A., et al.: A clean slate 4D approach to network control and management. SIGCOMM Comput. Commun. Rev. 35(5), 41–54 (2005). https://doi.org/10.1145/1096536.1096541
2. Langley, A., Hamburg, M., Turner, S.: Elliptic Curves for Security. RFC 7748, January 2016
3. Blanchet, B.: ProVerif: Cryptographic protocol verifier in the formal model (2020). https://prosecco.gforge.inria.fr/personal/bblanche/proverif/
4. Cremers, C., Horvat, M., Hoyland, J., Scott, S., van der Merwe, T.: A comprehensive symbolic analysis of TLS 1.3. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1773–1788. Association for Computing Machinery, New York (2017)
5. Lin, C.-L., Sun, H.-M., Steiner, M., Hwang, T.: Three-party encrypted key exchange without server public-keys. IEEE Commun. Lett. 5(12), 497–499 (2001)