메뉴 건너뛰기




Volumn 1976, Issue , 2000, Pages 614-627

Round-efficient conference key agreement protocols with provable security

Author keywords

[No Author keywords available]

Indexed keywords

FAULT TOLERANCE; SECURITY OF DATA;

EID: 84937394156     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44448-3_47     Document Type: Conference Paper
Times cited : (51)

References (30)
  • 15
    • 85031905507 scopus 로고
    • On the Composition of Zero-Knowledge Proof Systems
    • Springer-Verlag
    • O. Goldreich, H. Krawczyk, “On the Composition of Zero-Knowledge Proof Systems”, ICALP 90, Lecture Notes in Computer Science 443, pp.268-282, Springer-Verlag, 1990.
    • (1990) ICALP 90, Lecture Notes in Computer Science , vol.443 , pp. 268-282
    • Goldreich, O.1    Krawczyk, H.2
  • 27
    • 84978523717 scopus 로고
    • A Secure Audio Teleconference SystemProceedings of Advances in Cryptology-Crypto’88
    • Springer-Verlag
    • D.G. Steer, L. Strawczynski, W. Diffie, M. Wiener, “A Secure Audio Teleconference System”, Proceedings of Advances in Cryptology-Crypto’88, Lecture Notes in Computer Science 409, Springer-Verlag, pp.520-528, 1988.
    • (1988) Lecture Notes in Computer Science , vol.409 , pp. 520-528
    • Steer, D.G.1    Strawczynski, L.2    Diffie, W.3    Wiener, M.4
  • 29
    • 0031098126 scopus 로고    scopus 로고
    • Conference Key Distribution System with User Anonymity Based on Algebraic Approach
    • T.C. Wu, “Conference Key Distribution System with User Anonymity Based on Algebraic Approach”, Proceedings of IEE Computers and Digital Techniques, Vol. 144, No 2, pp.145-148, 1997.
    • (1997) Proceedings of IEE Computers and Digital Techniques , vol.144 , Issue.2 , pp. 145-148
    • Wu, T.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.