From post

Minimizing Information Leakage of Tree-Based RFID Authentication Protocols Using Alternate Tree-Walking.

, , и . ACISP, том 7372 из Lecture Notes in Computer Science, стр. 434-441. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Automated Proofs for Computational Indistinguishability., , и . Comput. J., 57 (10): 1513-1536 (2014)Improving the Efficiency of RFID Authentication with Pre-Computation., , и . AISC, том 125 из CRPIT, стр. 91-100. Australian Computer Society, (2012)Attribute-Based Authenticated Key Exchange., , и . ACISP, том 6168 из Lecture Notes in Computer Science, стр. 300-317. Springer, (2010)Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach., , и . ACISP, том 2727 из Lecture Notes in Computer Science, стр. 166-179. Springer, (2003)Efficient One-Round Key Exchange in the Standard Model., , , и . ACISP, том 5107 из Lecture Notes in Computer Science, стр. 69-83. Springer, (2008)GBD Threshold Cryptography with an Application to RSA Key Recovery., , , и . ACISP, том 3574 из Lecture Notes in Computer Science, стр. 394-405. Springer, (2005)Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions., , и . INDOCRYPT, том 4329 из Lecture Notes in Computer Science, стр. 176-190. Springer, (2006)Modelling denial of service attacks on JFK with Meadows's cost-based framework., , и . ACSW, том 54 из CRPIT, стр. 125-134. Australian Computer Society, (2006)Automating Computational Proofs for Public-Key-Based Key Exchange., , и . ProvSec, том 6402 из Lecture Notes in Computer Science, стр. 53-69. Springer, (2010)Verifier-Key-Flexible Universal Designated-Verifier Signatures., , , , и . IMACC, том 4887 из Lecture Notes in Computer Science, стр. 403-421. Springer, (2007)