Deniable Authentication on the Internet
From MaRDI portal
Publication:3600342
Recommendations
Cited in
(19)- A note on the Dwork-Naor timed deniable authentication
- Deniable ring authentication based on projective hash functions
- Deniable group communications in the presence of global unlimited adversary
- A deniable authenticated 2 party key agreement protocol from bilinear pairing
- An Efficient Deniable Key Exchange Protocol (Extended Abstract)
- On the security of SPLICE/AS -- The authentication system in WIDE Internet
- Composability and On-Line Deniability of Authentication
- Lightweight Email Signatures (Extended Abstract)
- Timed encryption with application to deniable key exchange
- Identity-based deniable authentication for ad hoc networks
- Full and partial deniability for authentication schemes
- Applied Cryptography and Network Security
- Deniable group key agreement
- Deniable authentication when signing keys leak
- Deniable RSA signature. The raise and fall of Ali Baba
- New approaches for deniable authentication
- A new framework for deniable secure key exchange
- Deniable internet key exchange
- A new approach for UC security concurrent deniable authentication
This page was built for publication: Deniable Authentication on the Internet
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3600342)