


default search action
5. Security Protocols Workshop 1997: Paris, France
- Bruce Christianson, Bruno Crispo, T. Mark A. Lomas, Michael Roe:

Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings. Lecture Notes in Computer Science 1361, Springer 1998, ISBN 3-540-64040-1 - Ross J. Anderson, Václav Matyás Jr., Fabien A. P. Petitcolas

, Iain E. Buchan
, Rudolf Hanka:
Secure Books: Protecting the Distribution of Knowledge. 1-11 - Michael G. Reed, Paul F. Syverson, David M. Goldschlag:

Protocols Using Anonymous Connections: Mobile Applications. 13-23 - Tatsuaki Okamoto:

Receipt-Free Electronic Voting Schemes for Large Scale Elections. 25-35 - Eduardo Solana, Jürgen Harms:

Flexible Internet Secure Transactions Based on Collaborative Domains. 37-51 - Bruno Crispo:

How to Build Evidence in a Public-Key Infrastructure for Multi-domain Environments. 53-65 - Holger Petersen, Markus Michels:

On Signature Schemes with Threshold Verification Detecting Malicious Verifiers. 67-78 - Stefan Lucks:

Open Key Exchange: How to Defeat Dictionary Attacks Without Encrypting Public Keys. 79-90 - John Kelsey

, Bruce Schneier, David A. Wagner:
Protocol Interactions and the Chosen Protocol Attack. 91-104 - Bruce Christianson

, James A. Malcolm:
Binding Bit Patterns to Real World Entities. 105-113 - Feng Bao, Robert H. Deng

, Yongfei Han, Albert B. Jeng, Arcot Desai Narasimhalu, Teow-Hin Ngair:
Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults. 115-124 - Ross J. Anderson, Markus G. Kuhn

:
Low Cost Attacks on Tamper Resistant Devices. 125-136 - Simon Blake-Wilson, Alfred Menezes:

Entity Authentication and Authenticated Key Transport Protocols Employing Asymmetric Techniques. 137-158 - Sigrid Gürgens:

SG Logic- A Formal Analysis Technique for Authentication Protocols. 159-176 - Holger Petersen:

How to Convert any Digital Signature Scheme into a Group Signature Scheme. 177-190 - Tatsuaki Okamoto:

Threshold Key-Recovery Systems for RSA. 191-200 - Klaus Kiefer:

A Weakness of the Menezes-Vanstone Cryptosystem. 201-206 - Pascal Paillier:

On Ideal Non-perfect Secret Sharing Schemes. 207-216

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














