Universally composable secure TNC model and EAP-TNC protocol in IF-T
暂无分享,去创建一个
[1] Hugo Krawczyk,et al. Universally Composable Notions of Key Exchange and Secure Channels , 2002, EUROCRYPT.
[2] Oded Goldreich. Foundations of Cryptography: Index , 2001 .
[3] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[4] David Cash,et al. The Twin Diffie-Hellman Problem and Applications , 2008, EUROCRYPT.
[5] Fan Zhang,et al. Universally composable anonymous Hash certification model , 2007, Science in China Series F: Information Sciences.
[6] Oded Goldreich,et al. Foundations of Cryptography: List of Figures , 2001 .
[7] Dilsun Kirli Kaynar,et al. A Logic of Secure Systems and its Application to Trusted Computing , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[8] Jianfeng Ma,et al. A new approach for UC security concurrent deniable authentication , 2008, Science in China Series F: Information Sciences.
[9] John C. Mitchell,et al. A derivation system and compositional logic for security protocols , 2005, J. Comput. Secur..
[10] Ran Canetti,et al. Universally composable signature, certification, and authentication , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..
[11] Scott A. Rotondo. Trusted Computing Group , 2011, Encyclopedia of Cryptography and Security.