Publisher
Springer Berlin Heidelberg
Reference34 articles.
1. Aiello, B., Bellovin, S., Blaze, M., Canetti, R., Ioannidis, J., Keromytis, A., Reingold, O.: Efficient, DoS-Resistant Secure Key Exchange for Internet Protocols. ACM Computers and Communications Security conference, CCS (2002), http://www.research.att.com/~smb/papers/jfk-ccs.pdf
2. Lecture Notes in Computer Science;M. Bellare,1994
3. Bellovin, S.M.: Problem Areas for the IP Security Protocols., In: Proceedings of the Sixth Usenix Unix Security Symposium (1996)
4. Lecture Notes in Computer Science;S. Blake-Wilson,1999
5. Burrows, M., Abadi, M., Needham, R.: A logic for authentication. ACM Trans. Computer Systems 8, 18–36 (1990)
Cited by
153 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. DDS Security+: Enhancing the Data Distribution Service With TPM-based Remote Attestation;Proceedings of the 19th International Conference on Availability, Reliability and Security;2024-07-30
2. Pudding: Private User Discovery in Anonymity Networks;2024 IEEE Symposium on Security and Privacy (SP);2024-05-19
3. Post-Quantum Ready Key Agreement for Aviation;IACR Communications in Cryptology;2024-04-09
4. Use of hybrid post-quantum key exchange in internet protocols;Journal of Computer Virology and Hacking Techniques;2024-03-16
5. AutoPKI: public key infrastructure for IoT with automated trust transfer;International Journal of Information Security;2024-03-02