Inproceedings,

Protocols Using Keys from Faulty Data.

.
Security Protocols Workshop, volume 2467 of Lecture Notes in Computer Science, page 170-179. Springer, (2001)

Meta data

Tags

Users

  • @dblp

Comments and Reviews