ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
0
views
0
references
Top references
cited by
9
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,043
similar
All similar
Record
: found
Abstract
: not found
Conference Proceedings
: not found
On message integrity in cryptographic protocols
proceedings-article
Author(s):
S.G. Stubblebine
,
V.D. Gligor
Publication date:
1992
Conference name:
1992 IEEE Computer Society Symposium on Research in Security and Privacy
Conference date:
4-6 May 1992
Read this article at
ScienceOpen
Publisher
Review
Review article
Invite someone to review
Bookmark
Cite as...
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Genome Integrity
Author and article information
Conference
Publication date:
1992
Pages
: 85-104
Article
DOI:
10.1109/RISP.1992.213268
SO-VID:
dcec1141-d89d-4e89-abbe-ea32f443a17e
Conference name:
1992 IEEE Computer Society Symposium on Research in Security and Privacy
Conference location:
Oakland, CA, USA
Conference date:
4-6 May 1992
History
Data availability:
Comments
Comment on this article
Sign in to comment
scite_
Similar content
3,043
Calculating a Cryptographic Primitive: Suitable for Wireless Sensor Networks
Authors:
Shan Suthaharan
Enhancing healthcare security in the digital era: Safeguarding medical images with lightweight cryptographic techniques in IoT healthcare applications
Authors:
Archana S. Nadhan
,
I. Jeena Jacob
A Design of Reliable True Random Number Generator for Cryptographic Applications
Authors:
Vittorio Bagini
,
Marco Bucci
See all similar
Cited by
9
The Security of the Cipher Block Chaining Message Authentication Code
Authors:
Phillip Rogaway
,
Mihir Bellare
,
Joe Kilian
The Security of Cipher Block Chaining
Authors:
Mihir Bellare
,
Joe Kilian
,
Phillip Rogaway
Protecting poorly chosen secrets from guessing attacks
Authors:
L Gong
,
J.H. Saltzer
,
R.M. Needham
…
See all cited by