Xxxxxxx and X. Xxxxxxxx. Analysis of key-exchange protocols and their use for building secure channels. In X. Xxxxxxxxx, editor, Advances in Cryptology – Eurocrypt 2001, volume 2045 of LNCS, pages 453–474. Springer-Verlag, 2001.
Appears in 2 contracts
Samples: Key Agreement, Key Agreement
Xxxxxxx and X. Xxxxxxxx. Analysis of key-exchange protocols and their use for building secure channels. In X. XxxxxxxxxProc. of EUROCRYPT’01, editorLNCS vol. 2045, Advances in Cryptology – Eurocrypt 2001pp. 453-474, volume 2045 of LNCSXxxxxxxx-Xxxxxx, pages 453–474. Springer-VerlagXxx Xxxx, 20010000.
Appears in 2 contracts
Samples: citeseerx.ist.psu.edu, citeseerx.ist.psu.edu
Xxxxxxx and X. Xxxxxxxx. Analysis of key-exchange protocols and their use for building secure channels. In X. Xxxxxxxxx, editor, Advances in Cryptology – Eurocrypt 2001, volume 2045 of LNCSSpringer- Verlag LNCS 2045, pages 453–474. Springer-Verlag, 2001. 12. X. Xxxx, X. Xxxxx and N.P. Smart. Identity-based key agreement protocols from pairings. Int. J. Inf. Security, 6, 213–241, 2007.
Appears in 1 contract
Samples: citeseerx.ist.psu.edu
Xxxxxxx and X. Xxxxxxxx. Analysis of key-exchange protocols and their use for building secure channels. In X. Xxxxxxxxx, editor, Advances in Cryptology – Eurocrypt 2001, volume 2045 of LNCS, pages 453–474. Springer-VerlagVerlag LNCS 2045, 453–474, 2001. 12. X. Xxxx, X. Xxxxx and N.P. Smart. Identity-based key agreement protocols from pairings. Int. J. Inf. Security, 6, 213–241, 2007.
Appears in 1 contract
Samples: eprint.iacr.org
Xxxxxxx and X. Xxxxxxxx. Analysis of key-exchange protocols and their use for building secure channels. In X. XxxxxxxxxXxxxxxxx, editor, Advances in Cryptology – Eurocrypt 2001, volume 2045 of LNCS, pages 453–474. Springer-Verlag, 2001.
Appears in 1 contract
Samples: Key Agreement
Xxxxxxx and X. Xxxxxxxx. , “Analysis of keyKey-exchange protocols Exchange Protocols and their use Their Use for building secure channels. In X. Xxxxxxxxx, editor, Advances in Cryptology – Building Secure Channels,” Eurocrypt 2001, volume 2045 of LNCS, pages 453–474. Springer-Verlag, 2001.LNCS Vol.2045
Appears in 1 contract
Samples: Tripartite Key Agreement
Xxxxxxx and X. Xxxxxxxx. , “Analysis of keyKey-exchange protocols Exchange Protocols and their use Their Use for building secure channels. In X. XxxxxxxxxBuilding Secure Channels”, editor, Advances in Cryptology – Eurocrypt 2001, volume 2045 of LNCS, pages 453–474. Springer-Verlag, 2001.LNCS Vol.2045
Appears in 1 contract
Samples: Tripartite Key Agreement