Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by Daniel Masny
Man-In-The-Middle Secure Authentication Schemes From LPN and Weak PRFs
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Chosen-Ciphertext Security From Subset Sum
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Related publications
Tightly Secure Signatures From Lossy Identification Schemes
Journal of Cryptology
Applied Mathematics
Computer Science Applications
Software
Secure Computation Without Authentication
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
SSL/TLS Session-Aware User Authentication – Or How to Effectively Thwart the Man-In-The-Middle
Computer Communications
Computer Networks
Communications
Secure In-Vehicle Systems Using Authentication
International Journal of Networked and Distributed Computing
Computer Networks
Computer Science Applications
Communications
Correction To: Man-In-The-Middle Attacks on Secure Simple Pairing in Bluetooth Standard V5.0 and Its Countermeasure
Personal and Ubiquitous Computing
Hardware
Management Science
Computer Science Applications
Architecture
Operations Research
Authentication Schemes From Actions on Graphs, Groups, or Rings
Annals of Pure and Applied Logic
Logic
“The Middle Man”
Secure Authentication Framework in Wireless Sensor Networks
International Journal of Computer Applications
Authentication Schemes - Comparison and Effective Password Spaces
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science