Publisher
Springer Berlin Heidelberg
Reference32 articles.
1. Lecture Notes in Computer Science;M. Abdalla,2009
2. Lecture Notes in Computer Science;M. Abdalla,2005
3. Bellare, M., Canetti, R., Krawczyk, H.: A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols. In: STOC 1998, pp. 419–428 (1998)
4. Lecture Notes in Computer Science;M. Bellare,2000
5. Lecture Notes in Computer Science;M. Bellare,1994