Private Authentication
- 24 June 2003
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 27 references indexed in Scilit:
- Handbook of Applied CryptographyPublished by Taylor & Francis ,2018
- Security issues in mobile communicationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity RevocationPublished by Springer Nature ,2001
- Security Weaknesses in BluetoothPublished by Springer Nature ,2001
- The XTR Public Key SystemPublished by Springer Nature ,2000
- Reconciling Two Views of CryptographyPublished by Springer Nature ,2000
- Untraceable mobility or how to travel incognitoComputer Networks, 1999
- MIXes in mobile communication systems: Location management with privacyPublished by Springer Nature ,1996
- Designated Verifier Proofs and Their ApplicationsPublished by Springer Nature ,1996
- Prudent engineering practice for cryptographic protocolsIEEE Transactions on Software Engineering, 1996