scientific article; zbMATH DE number 2143936
From MaRDI portal
Publication:4656171
zbMATH Open1065.94011MaRDI QIDQ4656171FDOQ4656171
Authors: Jianjun Xie, Junhong Li
Publication date: 11 March 2005
Title of this publication is not available (Why is that?)
Recommendations
- Key agreement protocols and their security analysis
- scientific article; zbMATH DE number 2006822
- Analysis of a key distribution scheme in secure multicasting
- Algebraic framework for the specification and analysis of cryptographic-key distribution
- Analysis and improvement of an authenticated key exchange protocol
- Analysis and design of a secure key exchange scheme
- scientific article; zbMATH DE number 1941251
- A security proof for key exchange protocols
Cited In (17)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Security analysis of the modular enhanced symmetric role authentication (mERA) protocol
- An attack on a recursive authentication protocol. A cautionary tale
- Analysis of security protocols based on authentication test
- Title not available (Why is that?)
- Formal analysis of authentication in 802.11i
- User-mediated authentication protocols and unforgeability in key collision
- Analysis of the Yahalom-Paulson protocol and its improvement
- Title not available (Why is that?)
- Formal analysis and parallelism in protocols
- Web security: Authentication protocols and their analysis
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Information Security and Cryptology
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4656171)