Protocols with Security Proofs for Mobile Applications
暂无分享,去创建一个
Colin Boyd | Juan Manuel González Nieto | Yiu Shing Terry Tin | Harikrishna Vasanta | C. Boyd | J. G. Nieto | Y. S. Tin | Harikrishna Vasanta
[1] Douglas R. Stinson,et al. Advances in Cryptology — CRYPTO’ 93 , 2001, Lecture Notes in Computer Science.
[2] Jacques Stern,et al. Extended Notions of Security for Multicast Public Key Cryptosystems , 2000, ICALP.
[3] Bart Preneel,et al. Advances in cryptology - EUROCRYPT 2000 : International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000 : proceedings , 2000 .
[4] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[5] Mihir Bellare,et al. Relations among Notions of Security for Public-Key Encryption Schemes , 1998, IACR Cryptol. ePrint Arch..
[6] Hugo Krawczyk,et al. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels , 2001, EUROCRYPT.
[7] Silvio Micali,et al. Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements , 2000, EUROCRYPT.
[8] Ronald L. Rivest,et al. A Digital Signature Scheme Secure Against Adaptive Chosen Message Attack*: Extended Abstract , 1987 .
[9] Mihir Bellare,et al. Provably secure session key distribution: the three party case , 1995, STOC '95.
[10] John T. Kohl,et al. The Kerberos Network Authentication Service (V5 , 2004 .
[11] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[12] Hugo Krawczyk,et al. A modular approach to the design and analysis of authentication and key exchange protocols (extended abstract) , 1998, STOC '98.
[13] Chris Newman,et al. Date and Time on the Internet: Timestamps , 2002, RFC.
[14] Mihir Bellare,et al. Entity Authentication and Key Distribution , 1993, CRYPTO.
[15] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[16] Robin Milner,et al. On Observing Nondeterminism and Concurrency , 1980, ICALP.