Welcome, Guest.Sign in for full access to IOU Digital Library's resources.

Welcome to IOU Digital Library

Page 1 | Results on this page: 10 | Digital Books: 14 | Physical Books: 0

Authentication codes with multiple arbiters

Subjects: Advances in Cryptology - EuroCrypt '88 Lecture Notes in Computer Science Volume 330 authentication codes arbitration

Published in: 101

Availability: 1 of 1(eBook)

By: Brickell E. F.

Cartesian authentication schemes

Subjects: Advances in Cryptology - EuroCrypt '89 Lecture Notes in Computer Science Volume 434 authentication codes perfect

Published in: 101

Availability: 1 of 1(eBook)

By: De Soete M. Vedder K.

Cryptanalysis of the Gemmell and Naor multiround authentication protocol

Subjects: Advances in Cryptology - Crypto '94 Lecture Notes in Computer Science Volume 839 authentication codes interactive authentication codes interactive authentication

Published in: 101

Availability: 1 of 1(eBook)

By: Gehrmann C.

Entity authentication and key distribution

Subjects: Advances in Cryptology - Crypto '93 Lecture Notes in Computer Science Volume 773 authentication identification schemes key exchange

Published in: 101

Availability: 1 of 1(eBook)

By: Bellare M.

Essentially l-fold secure authentication systems

Subjects: Advances in Cryptology - EuroCrypt '90 Lecture Notes in Computer Science Volume 473 authentication codes

Published in: 101

Availability: 1 of 1(eBook)

By: Beutelspacher A.

Full secure key exchange and authentication with no previously shared secrets

Subjects: Advances in Cryptology - EuroCrypt '89 Lecture Notes in Computer Science Volume 434 key exchange authentication

Published in: 101

Availability: 1 of 1(eBook)

By: Domingo-Ferrer J.

How to keep authenticity alive in a computer network

Subjects: Advances in Cryptology - EuroCrypt '89 Lecture Notes in Computer Science Volume 434 key exchange authentication local area networks

Published in: 101

Availability: 1 of 1(eBook)

By: Bauspiess F.

Fresh Arrivals