Sciweavers

1490 search results - page 49 / 298
» The Logic of Authentication Protocols
Sort
View
116
Voted
CCS
2001
ACM
15 years 8 months ago
The BiBa one-time signature and broadcast authentication protocol
Ï ÒØÖÓ Ù Ø × Ò ØÙÖ × Ñ ¸ Ò Û × Ò ØÙÖ ÓÒרÖÙ Ø ÓÒ Ø Ø Ù× × ÓÒ ¹Û Ý ÙÒ Ø ÓÒ× Û Ø ÓÙØ ØÖ Ô ÓÓÖ׺ ØÙÖ × ÐÓÛ Ú Ö ¬...
Adrian Perrig
82
Voted
ACSAC
2000
IEEE
15 years 8 months ago
An High-Speed ECC-based Wireless Authentication Protocol on an ARM Microprocessor
Murat Aydos, T. Yanik, Çetin Kaya Koç...
97
Voted
CSFW
1997
IEEE
15 years 7 months ago
Mechanized proofs for a recursive authentication protocol
Lawrence C. Paulson
116
Voted
ASIAN
2006
Springer
126views Algorithms» more  ASIAN 2006»
15 years 7 months ago
Certificateless Authenticated Two-Party Key Agreement Protocols
Tarjei K. Mandt, Chik How Tan