On Key Agreement and Conference Key Agreement (1997)

View PDF

Download Links

by Colin Boyd
Venue:Information Security and Privacy: Australasian Conference, LNCS(1270):294–302
Citations:33 - 1 self

Active Bibliography

861 Applied Cryptography -- Protocols, Algorithms, and . . . – Bruce Schneier
1425 Random Oracles are Practical: A Paradigm for Designing Efficient Protocols – Mihir Bellare, Phillip Rogaway - 1995
503 Keying hash functions for message authentication – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
545 The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks – Frank Stajano, Ross Anderson - 1999
642 Breaking and Fixing the Needham-Schroeder Public-Key Protocol using FDR – Gavin Lowe - 1996
828 A calculus for cryptographic protocols: The spi calculus – Martin Abadi, Andrew D. Gordon - 1999
1132 On the Security of Public Key Protocols – Danny Dolev, et al. - 1983
1535 Security Architecture for the Internet Protocol – Randall Atkinson - 1995
505 Secure Routing for Mobile Ad Hoc Networks – Panagiotis Papadimitratos, Zygmunt Haas - 2002