Author:
Tobarra Llanos,Cazorla Diego,Cuartero Fernando,Díaz Gregorio,Cambronero Emilia
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering
Reference22 articles.
1. Lecture notes in computer science;A. Armando,2005
2. Lecture notes in computer science;M. Backes,2006
3. Bellare, M., Desai, A., Jokipii, E., & Rogaway, P. (1997). A concrete security treatment of symmetric encryption. In Proceedings of 38th annual symposium on foundations of computer science (pp. 394–403). New York: IEEE.
4. Bellare, M., Kilian, J., & Rogaway, P. (2000). The security of the cipher block chaining message authentication code. Journal of Computer and Systems Sciences, 61(3), 362–399.
5. Bhargavan, K., Fournet, C., & Gordon, A. D. (2004). Verifying policy-based security for web services. In V. Atluri, B. Pfitzmann, & P. D. McDaniel (Eds.), ACM conference on computer and communications security (pp. 268–277). New York: Assoc. Comput. Mach.
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献