Applied Cryptography and Network Security
From MaRDI portal
Publication:5899225
DOI10.1007/11767480zbMath1151.94612OpenAlexW4211109874MaRDI QIDQ5899225
Stanislaw Jarecki, Ji-Hye Kim, Gene Tsudik
Publication date: 2 May 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11767480
privacyanonymityauthentication protocolsgroup key agreementprivacy-preserving authenticationsecret handshakes
Related Items (3)
Secret handshakes: full dynamicity, deniability and lattice-based design ⋮ Match me if you can: matchmaking encryption and its applications ⋮ Secret Handshakes with Dynamic Expressive Matching Policy
This page was built for publication: Applied Cryptography and Network Security