Sciweavers

10 search results - page 1 / 2
» ac 1997
Sort
View
102
Voted
AC
1997
Springer
15 years 7 months ago
Internet Security Protocols
Walter Fumy
104
Voted
AC
1997
Springer
15 years 7 months ago
Introduction to Computer Security
Bart De Decker
108
Voted
AC
1997
Springer
15 years 7 months ago
Elliptic Curve Public-Key Cryptosystems - An Introduction
Erik De Win, Bart Preneel
124
Voted
IJCAI
1997
15 years 4 months ago
Equational Reasoning using AC Constraints
Unfailing completion is a commonly used technique for equational reasoning. For equational problems with associative and commutative functions, unfailing completion often generate...
David A. Plaisted, Yunshan Zhu
143
Voted
AC
1997
Springer
15 years 7 months ago
Cryptographic Primitives for Information Authentication - State of the Art
This paper describes the state of the art for cryptographic primitives that are used for protecting the authenticity of information: cryptographic hash functions and digital signat...
Bart Preneel