From post

Protecting TLS-SA implementations for the challenge-response feature of EMV-CAP against challenge collision attacks.

, и . Secur. Commun. Networks, 1 (2): 125-134 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Distributed registration and key distribution (DiRK)., и . SEC, том 54 из IFIP Conference Proceedings, стр. 199-208. Chapman & Hall, (1996)Online Casinos., и . Kommunikation in Verteilten Systemen, стр. 2-16. Springer, (1997)Protecting TLS-SA implementations for the challenge-response feature of EMV-CAP against challenge collision attacks., и . Secur. Commun. Networks, 1 (2): 125-134 (2008)Protecting Key Exchange and Management Protocols Against Resource Clogging Attacks.. Communications and Multimedia Security, том 152 из IFIP Conference Proceedings, стр. 163-175. Kluwer, (1999)Quantitative Risk Analysis in Information Security Management: A Modern Fairy Tale.. IEEE Secur. Priv., 13 (6): 18-21 (2015)Disillusioning Alice and Bob.. IEEE Secur. Priv., 15 (5): 82-84 (2017)Microsoft .NET Passport: A Security Analysis.. Computer, 36 (7): 29-35 (2003)Privacy protection and anonymity services for the World Wide Web (WWW).. Future Gener. Comput. Syst., 16 (4): 379-391 (2000)SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle., , и . Comput. Commun., 29 (12): 2238-2246 (2006)Authentifikations- und Schlüsselverteilsysteme.. GI Jahrestagung, стр. 266-273. Springer, (1995)