default search action
5. Security Protocols Workshop 1997: Paris, France
- Bruce Christianson, Bruno Crispo, T. Mark A. Lomas, Michael Roe:
Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings. Lecture Notes in Computer Science 1361, Springer 1998, ISBN 3-540-64040-1 - Ross J. Anderson, Václav Matyás Jr., Fabien A. P. Petitcolas, Iain E. Buchan, Rudolf Hanka:
Secure Books: Protecting the Distribution of Knowledge. 1-11 - Michael G. Reed, Paul F. Syverson, David M. Goldschlag:
Protocols Using Anonymous Connections: Mobile Applications. 13-23 - Tatsuaki Okamoto:
Receipt-Free Electronic Voting Schemes for Large Scale Elections. 25-35 - Eduardo Solana, Jürgen Harms:
Flexible Internet Secure Transactions Based on Collaborative Domains. 37-51 - Bruno Crispo:
How to Build Evidence in a Public-Key Infrastructure for Multi-domain Environments. 53-65 - Holger Petersen, Markus Michels:
On Signature Schemes with Threshold Verification Detecting Malicious Verifiers. 67-78 - Stefan Lucks:
Open Key Exchange: How to Defeat Dictionary Attacks Without Encrypting Public Keys. 79-90 - John Kelsey, Bruce Schneier, David A. Wagner:
Protocol Interactions and the Chosen Protocol Attack. 91-104 - Bruce Christianson, James A. Malcolm:
Binding Bit Patterns to Real World Entities. 105-113 - Feng Bao, Robert H. Deng, Yongfei Han, Albert B. Jeng, Arcot Desai Narasimhalu, Teow-Hin Ngair:
Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults. 115-124 - Ross J. Anderson, Markus G. Kuhn:
Low Cost Attacks on Tamper Resistant Devices. 125-136 - Simon Blake-Wilson, Alfred Menezes:
Entity Authentication and Authenticated Key Transport Protocols Employing Asymmetric Techniques. 137-158 - Sigrid Gürgens:
SG Logic- A Formal Analysis Technique for Authentication Protocols. 159-176 - Holger Petersen:
How to Convert any Digital Signature Scheme into a Group Signature Scheme. 177-190 - Tatsuaki Okamoto:
Threshold Key-Recovery Systems for RSA. 191-200 - Klaus Kiefer:
A Weakness of the Menezes-Vanstone Cryptosystem. 201-206 - Pascal Paillier:
On Ideal Non-perfect Secret Sharing Schemes. 207-216
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.