Sciweavers

10 search results - page 1 / 2
» ac 1997
Sort
View
AC
1997
Springer
13 years 10 months ago
Internet Security Protocols
Walter Fumy
AC
1997
Springer
13 years 10 months ago
Introduction to Computer Security
Bart De Decker
IJCAI
1997
13 years 7 months ago
Equational Reasoning using AC Constraints
Unfailing completion is a commonly used technique for equational reasoning. For equational problems with associative and commutative functions, unfailing completion often generate...
David A. Plaisted, Yunshan Zhu
AC
1997
Springer
13 years 10 months ago
Cryptographic Primitives for Information Authentication - State of the Art
This paper describes the state of the art for cryptographic primitives that are used for protecting the authenticity of information: cryptographic hash functions and digital signat...
Bart Preneel