Amanote Research
Register
Sign In
Looking for Diamonds in the Desert - Extending Automatic Protocol Generation to Three-Party Authentication and Key Agreement Protocols
doi 10.1109/csfw.2000.856926
Full Text
Open PDF
Abstract
Available in
full text
Date
Unknown
Authors
A. Perrig
D. Song
Publisher
IEEE Comput. Soc
Related search
Extending Cryptographic Logics of Belief to Key Agreement Protocols
Certificateless Authenticated Two-Party Key Agreement Protocols
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Using Physiological Signals for Authentication in a Group Key Agreement Protocol
A Lightweight ID Based Authentication and Key Agreement Protocol for Multiserver Architecture
International Journal of Distributed Sensor Networks
Computer Networks
Engineering
Communications
Modular Security Proofs for Key Agreement Protocols
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Temporary Internet Access for Authentication and Key Agreement for LTE Networks
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
Computer Networks
Communications
An Identity-Based Mutual Authentication With Key Agreement
International Journal of Trend in Scientific Research and Development
On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science