Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card
- 1 January 2003
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 9 references indexed in Scilit:
- SIGMA: The ‘SIGn-and-MAc’ Approach to Authenticated Diffie-Hellman and Its Use in the IKE ProtocolsPublished by Springer Nature ,2003
- Validation of Elliptic Curve Public KeysPublished by Springer Nature ,2002
- Security Analysis of IKE’s Signature-Based Key-Exchange ProtocolPublished by Springer Nature ,2002
- Verification of a Formal Security Model for Multiapplicative Smart CardsPublished by Springer Nature ,2000
- The Internet Key Exchange (IKE)Published by RFC Editor ,1998
- HMAC: Keyed-Hashing for Message AuthenticationPublished by RFC Editor ,1997
- A key recovery attack on discrete log-based schemes using a prime order subgroupPublished by Springer Nature ,1997
- The Lattice Security Model In A Public Computing NetworkPublished by Association for Computing Machinery (ACM) ,1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976