izpis_h1_title_alt

Security weaknesses of authenticated key agreement protocols
Nose, Peter (Author)

URLURL - Presentation file, Visit http://www.sciencedirect.com/science?_ob=MImg&_imagekey=B6V0F-52P6M3K-1-1&_cdi=5645&_user=4776866&_pii=S0020019011001074&_origin=browse&_zone=rslt_list_item&_coverDate=07%2F31%2F2011&_sk=998889985&wchp=dGLzVzb-zSkWB&md5=77dd5f19449aa8bcf62547f8d61a8fd5&ie=/sdarticle.pdf This link opens in a new window
Language:English
Keywords:kriptografija, overjanje, dogovor o ključu, izmenjava ključa, bilinearno parjenje, cryptography, authentication, key agreement, key exchange, two-party, three-party, tripartite, bilinear pairing
Work type:Not categorized (r6)
Tipology:1.01 - Original Scientific Article
Organization:FRI - Faculty of computer and information science
Year:2011
Number of pages:str. 687-696
Numbering:Vol. 111, no. 14
UDC:004:003.26
ISSN on article:0020-0190
COBISS.SI-ID:8406612 Link is opened in a new window
Views:430
Downloads:173
Metadata:XML RDF-CHPDL DC-XML DC-RDF
 
Average score:(0 votes)
Your score:Voting is allowed only to logged in users.
:
Share:AddThis
AddThis uses cookies that require your consent. Edit consent...

Record is a part of a journal

Title:Information processing letters
Shortened title:Inf. process. lett.
Publisher:North-Holland
ISSN:0020-0190
COBISS.SI-ID:25612800 This link opens in a new window

Similar documents

Similar works from RUL:
Similar works from other Slovenian collections:

Comments

Leave comment

You have to log in to leave a comment.

Comments (0)
0 - 0 / 0
 
There are no comments!

Back