Deniable Authentication on the Internet
From MaRDI portal
Publication:3600342
Recommendations
Cited in
(19)- Composability and On-Line Deniability of Authentication
- Lightweight Email Signatures (Extended Abstract)
- New approaches for deniable authentication
- Deniable RSA signature. The raise and fall of Ali Baba
- Applied Cryptography and Network Security
- Deniable authentication when signing keys leak
- Deniable internet key exchange
- Deniable ring authentication based on projective hash functions
- Full and partial deniability for authentication schemes
- Deniable group key agreement
- A new framework for deniable secure key exchange
- Deniable group communications in the presence of global unlimited adversary
- An Efficient Deniable Key Exchange Protocol (Extended Abstract)
- A note on the Dwork-Naor timed deniable authentication
- Identity-based deniable authentication for ad hoc networks
- A new approach for UC security concurrent deniable authentication
- Timed encryption with application to deniable key exchange
- On the security of SPLICE/AS -- The authentication system in WIDE Internet
- A deniable authenticated 2 party key agreement protocol from bilinear pairing
This page was built for publication: Deniable Authentication on the Internet
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3600342)