Author:
Gürgens Sigrid,Lopez Javier,Peralta René
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference42 articles.
1. Bella G, Paulson LC (1998) Kerberos version iv: Inductive analysis of the secrecy goals. In: 5th European Symposium on Research in Computer Security, Lecture Notes in Computer Science. Springer-Verlag, pp 361–375
2. Bellare M, Canetti R, Krawczyk H (1998) A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols. In: Annual Symposium on the Theory of Computing. ACM
3. Bellare M, Rogaway P (1995) Provably secure session key distribution – the three party case. In: Annual Symposium on the Theory of Computing. ACM, pp 57–66
4. Berger R, Kannan S, Peralta R (1985) A framework for the study of cryptographic protocols. In: Advances in Cryptology – CRYPTO ’85, Lecture Notes in Computer Science. Springer-Verlag, pp 87–103
5. Boyd C (1990) Hidden assumptions in cryptographic protocols. In: IEEE Proceedings 137:433–436
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献