![]() |
Volumn 3580, Issue , 2005, Pages 652-663
|
Computationally sound implementations of equational theories against passive adversaries
|
Author keywords
[No Author keywords available]
|
Indexed keywords
AUTOMATA THEORY;
COMPUTATIONAL METHODS;
NETWORK PROTOCOLS;
SECURITY OF DATA;
ARBITRARY EQUATIONAL THEORY;
SECURITY PROTOCOLS;
STATIC EQUIVALENCE;
CRYPTOGRAPHY;
|
EID: 26444541858
PISSN: 03029743
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1007/11523468_53 Document Type: Conference Paper |
Times cited : (47)
|
References (14)
|