2005 | ||
---|---|---|
11 | EE | Mike Just: Challenge-Response Identification. Encyclopedia of Cryptography and Security 2005 |
10 | EE | Mike Just: Diffie-Hellman Key Agreement. Encyclopedia of Cryptography and Security 2005 |
9 | EE | Mike Just: Key agreement. Encyclopedia of Cryptography and Security 2005 |
8 | EE | Mike Just: Needham-Schroeder Protocols. Encyclopedia of Cryptography and Security 2005 |
7 | EE | Mike Just: Schnorr Indentification Scheme. Encyclopedia of Cryptography and Security 2005 |
2004 | ||
6 | EE | Mike Just: Designing and Evaluating Challenge-Question Systems. IEEE Security & Privacy 2(5): 32-39 (2004) |
2003 | ||
5 | EE | Mike Just, Evangelos Kranakis, Tao Wan: Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks. ADHOC-NOW 2003: 151-163 |
1999 | ||
4 | EE | Mike Just, Paul C. van Oorschot: Addressing the Problem of Undetected Signature Key Compromise. NDSS 1999 |
1998 | ||
3 | EE | Mike Just: Some Timestamping Protocol Failures. NDSS 1998 |
1996 | ||
2 | Mike Just, Serge Vaudenay: Authenticated Multi-Party Key Agreement. ASIACRYPT 1996: 36-49 | |
1994 | ||
1 | EE | Mike Just, Evangelos Kranakis, Danny Krizanc, Paul C. van Oorschot: On Key Distribution via True Broadcasting. ACM Conference on Computer and Communications Security 1994: 81-88 |
1 | Evangelos Kranakis | [1] [5] |
2 | Danny Krizanc | [1] |
3 | Paul C. van Oorschot | [1] [4] |
4 | Serge Vaudenay | [2] |
5 | Tao Wan | [5] |