1. LNCS;Y. Aumann,1998
2. Y. Aumann, M. Rabin, Efficient deniable authentication of long messages, in International Conference on Theoretical Computer Science in Honor of Professor Manuel Blum’s 60th Birthday, April 20–24, 1998. Available from:
http://www.cs.cityu.edu.hk/dept/video.html
3. LNCS;N. Barić,1997
4. M. Bellare, R. Canetti, H. Krawczyk, A modular approach to the design and analysis of authentication and key exchange protocols, in Proc. of 30th Symposium on Theory of Computing (STOC) (ACM, New York, 1998), pp. 419–428
5. LNCS;D. Boneh,2004