Restricted Identification Secure in the Extended Canetti-Krawczyk Model
暂无分享,去创建一个
[1] Hugo Krawczyk,et al. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels , 2001, EUROCRYPT.
[2] Miroslaw Kutylowski,et al. Mutual Restricted Identification , 2013, EuroPKI.
[3] Hermann A. Maurer,et al. Levels of Anonymity , 1995, J. Univers. Comput. Sci..
[4] Özgür Dagdelen,et al. The cryptographic security of the German electronic identity card , 2013 .
[5] Kristin E. Lauter,et al. Stronger Security of Authenticated Key Exchange , 2006, ProvSec.
[6] Marc Fischlin,et al. Random Oracles with(out) Programmability , 2010, ASIACRYPT.
[7] Mihir Bellare,et al. Entity Authentication and Key Distribution , 1993, CRYPTO.
[8] Sven Türpe,et al. Electronic Identity Cards for User Authentication—Promise and Practice , 2012, IEEE Security & Privacy.
[9] Miroslaw Kutylowski,et al. Restricted Identification without Group Keys , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[10] Lucjan Hanzlik,et al. Cryptographic Protocols for Modern Identification Documents , 2015 .
[11] Norbert Pohlmann,et al. Security Analysis of OpenID, followed by a Reference Implementation of an nPA-based OpenID Provider , 2010, ISSE.