Bruce Christianson, Bruno Crispo, T. Mark A. Lomas, Michael Roe (Eds.):
Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings.
Lecture Notes in Computer Science 1361 Springer 1998, ISBN 3-540-64040-1 BibTeX
@proceedings{DBLP:conf/spw/1997,
editor = {Bruce Christianson and
Bruno Crispo and
T. Mark A. Lomas and
Michael Roe},
title = {Security Protocols, 5th International Workshop, Paris, France,
April 7-9, 1997, Proceedings},
booktitle = {Security Protocols Workshop},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {1361},
year = {1998},
isbn = {3-540-64040-1},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
- Ross J. Anderson, Václav Matyás Jr., Fabien A. P. Petitcolas, Iain E. Buchan, Rudolf Hanka:
Secure Books: Protecting the Distribution of Knowledge.
1-11 BibTeX
- Michael G. Reed, Paul F. Syverson, David M. Goldschlag:
Protocols Using Anonymous Connections: Mobile Applications.
13-23 BibTeX
- Tatsuaki Okamoto:
Receipt-Free Electronic Voting Schemes for Large Scale Elections.
25-35 BibTeX
- Eduardo Solana, Jürgen Harms:
Flexible Internet Secure Transactions Based on Collaborative Domains.
37-51 BibTeX
- Bruno Crispo:
How to Build Evidence in a Public-Key Infrastructure for Multi-domain Environments.
53-65 BibTeX
- Holger Petersen, Markus Michels:
On Signature Schemes with Threshold Verification Detecting Malicious Verifiers.
67-78 BibTeX
- Stefan Lucks:
Open Key Exchange: How to Defeat Dictionary Attacks Without Encrypting Public Keys.
79-90 BibTeX
- John Kelsey, Bruce Schneier, David Wagner:
Protocol Interactions and the Chosen Protocol Attack.
91-104 BibTeX
- Bruce Christianson, James A. Malcolm:
Binding Bit Patterns to Real World Entities.
105-113 BibTeX
- Feng Bao, Robert H. Deng, Yongfei Han, Albert B. Jeng, A. Desai Narasimhalu, Teow-Hin Ngair:
Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults.
115-124 BibTeX
- Ross J. Anderson, Markus G. Kuhn:
Low Cost Attacks on Tamper Resistant Devices.
125-136 BibTeX
- Simon Blake-Wilson, Alfred Menezes:
Entity Authentication and Authenticated Key Transport Protocols Employing Asymmetric Techniques.
137-158 BibTeX
- Sigrid Gürgens:
SG Logic- A Formal Analysis Technique for Authentication Protocols.
159-176 BibTeX
- Holger Petersen:
How to Convert any Digital Signature Scheme into a Group Signature Scheme.
177-190 BibTeX
- Tatsuaki Okamoto:
Threshold Key-Recovery Systems for RSA.
191-200 BibTeX
- Klaus Kiefer:
A Weakness of the Menezes-Vanstone Cryptosystem.
201-206 BibTeX
- Pascal Paillier:
On Ideal Non-perfect Secret Sharing Schemes.
207-216 BibTeX
Copyright © Sat May 16 23:42:20 2009
by Michael Ley (ley@uni-trier.de)