Author:
Dodis Yevgeniy,Fiore Dario
Publisher
Springer International Publishing
Reference21 articles.
1. Bellare, M., Canetti, R., Krawczyk, H.: A modular approach to the design and analysis of authentication and key exchange protocols (extended abstract). In: 30th ACM STOC, pp. 419–428. ACM Press, May 1998
2. Lecture Notes in Computer Science;M Bellare,1994
3. Lecture Notes in Computer Science;S Blake-Wilson,1997
4. Lecture Notes in Computer Science;S Blake-Wilson,1999
5. Lecture Notes in Computer Science;R Canetti,2001
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献