|
Volumn , Issue , 1999, Pages 32-43
|
Safe simplifying transformations for security protocols or not just the Needham Schroeder public key protocol
|
Author keywords
[No Author keywords available]
|
Indexed keywords
COMPUTATIONAL COMPLEXITY;
CRYPTOGRAPHY;
MATHEMATICAL TRANSFORMATIONS;
SECURITY OF DATA;
COMMERCIAL PROTOCOLS;
NEEDHAM-SCHROEDER PUBLIC KEY PROTOCOL;
SECURITY PROTOCOLS;
NETWORK PROTOCOLS;
|
EID: 0032691953
PISSN: 10636900
EISSN: None
Source Type: Conference Proceeding
DOI: None Document Type: Article |
Times cited : (10)
|
References (13)
|