Author:
Katz Jonathan,MacKenzie Philip,Taban Gelareh,Gligor Virgil
Publisher
Springer Berlin Heidelberg
Reference38 articles.
1. Lecture Notes in Computer Science;M. Bellare,2000
2. Bellare, M., Rogaway, P.: Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In: Proc. 1st ACM Conference on Computer and Communications Security, pp. 62–73. ACM, New York (1993)
3. Lecture Notes in Computer Science;M. Bellare,1994
4. Bellare, M., Rogaway, P.: Provably-Secure Session Key Distribution: the Three Party Case. In: 27th ACM Symposium on Theory of Computing (STOC), pp. 57–66. ACM, New York (1995)
5. Bellovin, S.M., Merritt, M.: Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks. In: IEEE Symposium on Research in Security and Privacy, pp. 72–84. IEEE, Los Alamitos (1992)
Cited by
37 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献