Author:
Backes M.,Pfitzmann B.,Steiner M.,Waidner M.
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. On the Relationships between Notions of Simulation-Based Security;Journal of Cryptology;2008-01-30
2. Simulatable security and polynomially bounded concurrent composability;2006 IEEE Symposium on Security and Privacy (S&P'06);2006
3. Modular proofs for key exchange: rigorous optimizations in the Canetti–Krawczyk model;Applicable Algebra in Engineering, Communication and Computing;2005-11-07
4. Reactively secure signature schemes;International Journal of Information Security;2005-02-08
5. Relating Symbolic and Cryptographic Secrecy;IEEE Transactions on Dependable and Secure Computing;2005-02