Author:
Yoon Eun-Jun,Yoo Kee-Young,Yeo Sang-Soo,Lee Changhoon
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference18 articles.
1. Dwork, C., Naor, M., & Sahai, A. (1998). Concurrent zero-knowledge. In Proceedings of the 30th ACM STOC’98, Dallas, TX, USA, 409–418.
2. Aumann, Y., & Rabin, M. (1998). Efficient deniable authentication of long messages. In International Conference on Theoretical Computer Science in Honor of Professor Manuel Blum’s 60th birthday.
3. Deng X., Lee C. H., Zhu H. (2001) Deniable authentication protocols. IEE Proceedings Computers and Digital Techniques 148(2): 101–104
4. Fan L., Xu C. X., Li J. H. (2002) Deniable authentication protocol based on Diffie-Hellman algorithm. Electronics letters 38(14): 705–706
5. Hsieh B. T., Sun H. M. (2004) An improvement of a deniable authentication protocol. IEICE Transactions On Communications E87-B(10): 3099–3101
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献