Amanote Research

Amanote Research

    RegisterSign In

Security Bounds for Parallel Versions of Identification Protocols

doi 10.1007/3-540-47555-9_40
Full Text
Open PDF
Abstract

Available in full text

Date

Unknown

Authors
Lidong ChenIvan Damgård
Publisher

Springer Berlin Heidelberg


Related search

Resource Bounds for Self Stabilizing Message Driven Protocols

1991English

Verification of Security Protocols

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2008English

Tight Bounds for Parallel Randomized Load Balancing

2011English

Verification of Security Protocols

English

Formal Methods for Assuring Security of Protocols

Computer Journal
Computer Science
2002English

Adaptive Protocols for Parallel Discrete Event Simulation

Journal of the Operational Research Society
ManagementProbabilityMarketingUncertaintySimulationManagement ScienceStatisticsManagement Information SystemsModelingStrategyOperations Research
2000English

An Extensible Platform for Evaluating Security Protocols

English

Modular Security Proofs for Key Agreement Protocols

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2005English

Analyzing Internet Security Protocols

English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy