On the security of ping-pong protocols
- 31 December 1982
- journal article
- Published by Elsevier in Information and Control
- Vol. 55 (1-3) , 57-68
- https://doi.org/10.1016/s0019-9958(82)90401-6
Abstract
No abstract availableKeywords
This publication has 5 references indexed in Scilit:
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976
- Tree-Manipulating Systems and Church-Rosser TheoremsJournal of the ACM, 1973