Notes on Formal Methods Used for Verification of the Security Properties of Protocols Used in Wireless Environment
スポンサーリンク
概要
- 論文の詳細を見る
- 2005-12-14
著者
-
IMAI Hideki
Chuo University
-
Kobara K
Research Center For Information Security (rcis) National Institute Of Advanced Industrial Science &a
-
Kobara K
Research Center For Information Security (rcis):national Institute Of Advanced Industrial Science An
-
Kobara K
Univ. Tokyo Tokyo Jpn
-
Kobara Kazukuni
National Inst. Advanced Industrial Sci. & Technol. (aist) Tokyo Jpn
-
Kobara Kazukuni
Information And Systems Institute Of Industrial Science The University Of Tokyo
-
Imai H
Research Center For Information Security (rcis):national Institute Of Advanced Industrial Science An
-
Kobara Kazukuni
Imai Laboratory Information And Systems Institute Of Industrial Science University Of Tokyo
-
TABET Abdelilah
Information and Systems, Institute of Industrial Science, The university of Tokyo
-
IMAI Hideki
Information and Systems, Institute of Industrial Science, The university of Tokyo
-
Imai H
Chuo University
-
Imai H
Univ. Tokyo Tokyo
-
Tabet Abdelilah
Information And Systems Institute Of Industrial Science The University Of Tokyo
-
Imai Hideki
Information & Systems Institute Of Industrial Science The University Of Tokyo
関連論文
- Anonymous Password-Authenticated Key Exchange: New Construction and Its Extensions
- Extension of Broadcasting Service by Using Electronic Tokens(Contents Technology and Web Information Systems)
- Traitor Tracing Scheme Secure against Adaptive Key Exposure and its Application to Anywhere TV Service(Discrete Mathematics and Its Applications)
- Unconditionally Secure Chaffing-and-Winnowing
- Shared Pseudo-Random Secret Generation Protocols (Special Section on Discrete Mathematics and Its Applications)
- Efficient and Secure Multiparty Generation of Digital Signatures Based on Discrete Logarithms (Special Section on Discrete Mathematics and Its Applications)
- Smallest Size of Circulant Matrix for Regular (3, L) and (4, L) Quasi-Cyclic LDPC Codes with Girth 6
- An RSA-Based Leakage-Resilient Authenticated Key Exchange Protocol Secure against Replacement Attacks, and Its Extensions
- Anonymous Password-Authenticated Key Exchange : New Construction and Its Extensions
- A Secure Construction for Threshold Anonymous Password-Authenticated Key Exchange