41
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Article: not found

      Authentication and authenticated key exchanges

      , ,
      Designs, Codes and Cryptography
      Springer Nature

      Read this article at

      ScienceOpenPublisher
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references11

          • Record: found
          • Abstract: not found
          • Book Chapter: not found

          Identity-Based Cryptosystems and Signature Schemes

          Adi Shamir (1985)
            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            A logic of authentication

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              How to time-stamp a digital document

                Bookmark

                Author and article information

                Journal
                Designs, Codes and Cryptography
                Des Codes Crypt
                Springer Nature
                0925-1022
                1573-7586
                June 1992
                June 1992
                : 2
                : 2
                : 107-125
                Article
                10.1007/BF00124891
                93a031ee-cfe3-4220-9196-b6457a3d0fc3
                © 1992
                History

                Comments

                Comment on this article