Amanote Research
Register
Sign In
Securing Group Key Exchange Against Strong Corruptions
doi 10.1145/1368310.1368347
Full Text
Open PDF
Abstract
Available in
full text
Date
January 1, 2008
Authors
Emmanuel Bresson
Mark Manulis
Publisher
ACM Press
Related search
Human Computing for Handling Strong Corruptions in Authenticated Key Exchange
Group Key Exchange Protocols Withstanding Ephemeral-Key Reveals
IET Information Security
Computer Networks
Software
Information Systems
Communications
Securing Life Against Life
BioSocieties
Health Policy
Health
MTKD: An Algorithm for Multi-Tier Key Distribution for Securing Group Communication in WSN
International Journal of Advances in Applied Sciences
Cryptanalysis of a Generic One-Round Key Exchange Protocol With Strong Security
IET Information Security
Computer Networks
Software
Information Systems
Communications
On Security Models and Compilers for Group Key Exchange Protocols
Protecting Key Exchange and Management Protocols Against Resource Clogging Attacks
Securing M2m Post-Quantum Secret Key Cryptography
IOSR Journal of Electronics and Communication Engineering
Strongly Secure One-Round Group Authenticated Key Exchange in the Standard Model
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science