![]() |
Volumn 283, Issue 2, 2002, Pages 333-380
|
Authentication tests and the structure of bundles
|
Author keywords
Authentication; Bundles; Cryptographic protocol design; Cryptographic protocols; Secrecy; Strand spaces
|
Indexed keywords
COMPUTER CRIME;
CRYPTOGRAPHY;
HEURISTIC METHODS;
NETWORK PROTOCOLS;
CRYPTOGRAPHIC PROTOCOLS;
SECURITY OF DATA;
|
EID: 0037076868
PISSN: 03043975
EISSN: None
Source Type: Journal
DOI: 10.1016/S0304-3975(01)00139-6 Document Type: Article |
Times cited : (119)
|
References (30)
|