-
1
-
-
0028532812
-
Denial of services: An example
-
Needham RM. Denial of services: An example. Communications of ACM 1994; 37(11)-42-46.
-
(1994)
Communications of ACM
, vol.37
, Issue.11
, pp. 42-46
-
-
Needham, R.M.1
-
2
-
-
0006013621
-
Towards network denial of service resistant protocols
-
IFIP Series, Beijing, China
-
Leiwo J, Aura T, Nikander P. Towards network denial of service resistant protocols. Proceedings of the Sixteenth Annual Working Conference on Information Security, IFIP Series, Vol.175, Beijing, China, 2000.
-
(2000)
Proceedings of the Sixteenth Annual Working Conference on Information Security
, vol.175
-
-
Leiwo, J.1
Aura, T.2
Nikander, P.3
-
5
-
-
3342930018
-
Integrating authentication in public key distribution system
-
Lee WB, Chang CC. Integrating authentication in public key distribution system. Information Processing Letters 1996; 57:49-52.
-
(1996)
Information Processing Letters
, vol.57
, pp. 49-52
-
-
Lee, W.B.1
Chang, C.C.2
-
7
-
-
0041520685
-
Multi-party key agreement protocols with cheater identification
-
Tseng YM. Multi-party key agreement protocols with cheater identification. Applied Mathematics and Computation 2003; 145(2-3)551-559.
-
(2003)
Applied Mathematics and Computation
, vol.145
, Issue.2-3
, pp. 551-559
-
-
Tseng, Y.M.1
-
8
-
-
2042471479
-
On the security of an efficient two-pass key agreement protocol
-
Tseng YM. On the security of an efficient two-pass key agreement protocol. Computer Standards and Interfaces 2004; 26(4):371-374.
-
(2004)
Computer Standards and Interfaces
, vol.26
, Issue.4
, pp. 371-374
-
-
Tseng, Y.M.1
-
10
-
-
0032640752
-
xy via password authentication
-
xy via password authentication. Electronics Letters 1999; 35(11):892-893.
-
(1999)
Electronics Letters
, vol.35
, Issue.11
, pp. 892-893
-
-
Kwon, T.1
Song, J.2
-
11
-
-
84874800178
-
A public key cryptosystem and signature scheme based on discrete logarithm
-
ElGamal T. A public key cryptosystem and signature scheme based on discrete logarithm. IEEE Transactions on Information Theory 1985; 31(4):469-472.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
Elgamal, T.1
-
17
-
-
84943235829
-
Pricing via processing or combating junk mail
-
Lecture Notes in Computer Science 740, Springer-Verlag
-
Dwork C, Naor M. Pricing via processing or combating junk mail. Advances in Cryptology - Crypto'92, Lecture Notes in Computer Science 740, Springer-Verlag, 1993; 139-147.
-
(1993)
Advances in Cryptology - Crypto'92
, pp. 139-147
-
-
Dwork, C.1
Naor, M.2
-
19
-
-
0035311761
-
Key agreement protocols resistant to a denial-of-service attack
-
Hirose S, Matsuura K. Key agreement protocols resistant to a denial-of-service attack. IEICE Transactions on Information and Systems 2001; E-84-D(4):477-484.
-
(2001)
IEICE Transactions on Information and Systems
, vol.E-84-D
, Issue.4
, pp. 477-484
-
-
Hirose, S.1
Matsuura, K.2
-
20
-
-
0001849866
-
The status of MD5 after a recent attack
-
Dobbertin H. The status of MD5 after a recent attack. CryptoBytes 1996; 2(2):1-6.
-
(1996)
CryptoBytes
, vol.2
, Issue.2
, pp. 1-6
-
-
Dobbertin, H.1
-
21
-
-
0002670834
-
Message recovery for signature schemes based on the discrete logarithm
-
Nyberg K, Rueppel RA. Message recovery for signature schemes based on the discrete logarithm. Designs Codes and Cryptography 1996; 7(1-2): 61-81.
-
(1996)
Designs Codes and Cryptography
, vol.7
, Issue.1-2
, pp. 61-81
-
-
Nyberg, K.1
Rueppel, R.A.2
|