Private authentication
Open Access
- 23 March 2004
- journal article
- Published by Elsevier in Theoretical Computer Science
- Vol. 322 (3) , 427-476
- https://doi.org/10.1016/j.tcs.2003.12.023
Abstract
No abstract availableKeywords
This publication has 30 references indexed in Scilit:
- Private AuthenticationPublished by Springer Nature ,2003
- Security issues in mobile communicationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Efficient, DoS-resistant, secure key exchange for internet protocolsPublished by Association for Computing Machinery (ACM) ,2002
- Secure Implementation of Channel AbstractionsInformation and Computation, 2002
- Key-Privacy in Public-Key EncryptionPublished by Springer Nature ,2001
- Mobile values, new names, and secure communicationPublished by Association for Computing Machinery (ACM) ,2001
- Authentication primitives and their compilationPublished by Association for Computing Machinery (ACM) ,2000
- Untraceable mobility or how to travel incognitoComputer Networks, 1999
- A Calculus for Cryptographic Protocols: The Spi CalculusInformation and Computation, 1999
- Prudent engineering practice for cryptographic protocolsIEEE Transactions on Software Engineering, 1996