Author:
Lee Wei-Bin,Wu Chia-Chun,Tsaur Woei-Jiunn
Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference14 articles.
1. Authentication enhanced security and error correcting codes;Aumann,1998
2. Y. Aumann, M. Rabin, “Efficient deniable authentication of long messages,” in International Conference on Theoretical Computer Science in Honor of Professor Manuel Blum’s 60th birthday, 1998. .
3. Deniable authentication protocols;Deng;IEE Proceedings – Computers and Digital Techniques,2001
4. C. Dwork, M. Naor, A. Sahai, Concurrent zero-knowledge, in: Proceedings of 30th ACM STOC’98, 1998, pp. 409–418.
5. Deniable authentication protocol based on Diffie–Hellman algorithm;Fan;Electronics Letters,2002
Cited by
36 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献