Search results

From MaRDI portal
  • Communication Systems 2010-04-24 Paper On Establishing and Fixing a Parallel Session Attack in a Security Protocol Studies in Computational Intelligence 2009-03-12...
    10 bytes (47 words) - 20:48, 14 April 2026
  • Communication Systems 2010-04-24 Paper On Establishing and Fixing a Parallel Session Attack in a Security Protocol Studies in Computational Intelligence 2009-03-12...
    10 bytes (47 words) - 20:48, 14 April 2026
  • Publication Date of Publication Type On Establishing and Fixing a Parallel Session Attack in a Security Protocol 2009-03-12 Paper...
    10 bytes (13 words) - 03:03, 28 December 2023
  • de/entity/Q3111981 2012-01-13 Paper On Establishing and Fixing a Parallel Session Attack in a Security Protocol 2009-03-12 Paper...
    10 bytes (13 words) - 10:10, 6 October 2023
  • data hiding method for the VQ index table 2008-03-19 Paper Four-scanning attack on hierarchical digital watermarking method for image tamper detection and...
    10 bytes (17 words) - 20:23, 10 April 2026
  • one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attack 2023-08-14 Paper Montgomery Curves and the Montgomery...
    10 bytes (17 words) - 23:05, 11 April 2026
  • non-malleable commitments from one-way functions 2017-11-15 Paper Black-box parallel garbled RAM 2017-11-15 Paper A randomized online quantile summary in \(O((1/\varepsilon)...
    10 bytes (15 words) - 16:57, 10 April 2026
  • Team's seasonal win probabilities 2022-11-22 Paper BLOCKCHAIN DOUBLE-SPEND ATTACK DURATION 2022-11-18 Paper Choosing the best arm with guaranteed confidence...
    10 bytes (15 words) - 21:22, 10 April 2026
  • spline collocation systems 2000-02-02 Paper A parallel algorithm for \(4\times 4\) DCT 2000-02-02 Paper A parallel algorithm for solving Toeplitz linear systems...
    10 bytes (12 words) - 13:18, 13 April 2026
  • authenticated key establishment protocols On Establishing and Fixing a Parallel Session Attack in a Security Protocol A Bird’s-Eye View of Modern Symmetric Cryptography...
    15 bytes (654 words) - 18:55, 14 April 2026
  • article; zbMATH DE number 2102391 On Establishing and Fixing a Parallel Session Attack in a Security Protocol Publication:4656171 Cited in (11) Language-oriented...
    15 bytes (186 words) - 16:34, 4 February 2024
  • groups with distributive encryption On Establishing and Fixing a Parallel Session Attack in a Security Protocol On-the-Fly Model Checking of Fair Non-repudiation...
    12 bytes (294 words) - 07:37, 13 March 2026
  • On the security of recent protocols On Establishing and Fixing a Parallel Session Attack in a Security Protocol Authentication tests and the structure of...
    15 bytes (235 words) - 15:26, 11 April 2026
  • This page was built for publication: On Establishing and Fixing a Parallel Session Attack in a Security Protocol Report a bug (only for logged in users!)Click...
    15 bytes (291 words) - 05:18, 5 February 2024
  • Impersonation Attacks on Group Key Exchange Protocols An attack-finding algorithm for security protocols. On Establishing and Fixing a Parallel Session Attack in...
    15 bytes (173 words) - 23:06, 8 February 2024
  • Impersonation attacks on a mobile security protocol for end-to-end communications On Establishing and Fixing a Parallel Session Attack in a Security Protocol...
    15 bytes (204 words) - 13:31, 12 April 2026
  • Establishing and Fixing a Parallel Session Attack in a Security Protocol This page was built for publication: Impersonation attacks on a mobile security protocol...
    15 bytes (233 words) - 02:41, 5 February 2024
  • Establishing and Fixing a Parallel Session Attack in a Security Protocol On the Security of HB# against a Man-in-the-Middle Attack Construction of a Hybrid...
    15 bytes (512 words) - 04:23, 5 February 2024
  • randomized coordinated attack protocols Fault Attacks on Pairing-Based Protocols: Revisited On Establishing and Fixing a Parallel Session Attack in a Security Protocol...
    15 bytes (221 words) - 20:21, 3 February 2024
  • for security protocol verification On Establishing and Fixing a Parallel Session Attack in a Security Protocol Alice and Bob: reconciling formal models...
    15 bytes (388 words) - 12:03, 11 April 2026