Subject
General Computer Science,Theoretical Computer Science
Reference24 articles.
1. Mihir Bellare and Phillip Rogaway. Entity authentication and key distribution. In Advances in Cryptology CRYPTO'93, LNCS 773, pages 232–249. Springer Verlag, 1994.
2. Systematic design of a family of attack-resistant authentication protocols;Bird;IEEE Journal on Selected Areas in Communications,1993
3. Systematic design of two-party authentication protocols;Bird,1992
4. Authentication and authenticated key exchanges;Diffie;Designs, Codes, and Cryptography,1992
5. International Organisation for Standardization. Basic Reference Model for Open Systems Interconnection (OSI) Part 2: SECURITY Architecture. Genève, Switzerland, 1988.
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献