Examining indistinguishability-based proof models for key establishment protocols
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 604 |
---|---|
container_issue | |
container_start_page | 585 |
container_title | |
container_volume | |
creator | CHOO, Kim-Kwang Raymond BOYD, Colin HITCHCOCK, Yvonne |
description | |
doi_str_mv | 10.1007/11593447_32 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>pascalfrancis</sourceid><recordid>TN_cdi_pascalfrancis_primary_17414492</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>17414492</sourcerecordid><originalsourceid>FETCH-LOGICAL-c2452-458af67c5426562fa7c012d1752edf5a017dadeeecbbbba890879bd475be41533</originalsourceid><addsrcrecordid>eNotjEtLxDAURoMPsI6z8g9047Kam9w0zVKG8QEDIui63Oah0b5oKth_b0XP5juLw8fYJfBr4FzfACgjEXUtxRHLoAQopERzzM6lQi55WWF5wrLVRGE0yjO2TemDr0hQ2piMPe-_qYt97N_y2LuY5tW-YnqnJrZxXoqGknf5OA1DyLvB-TblYZjyT7_kPs3UtGvb-X7-TebBDm26YKeB2uS3_7thr3f7l91DcXi6f9zdHgorUIkCVUWh1FahKFUpAmnLQTjQSngXFHHQjpz33jYrVBleadM41KrxCErKDbv6-x0pWWrDRL2NqR6n2NG01KAREI2QP6p5Vdw</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Examining indistinguishability-based proof models for key establishment protocols</title><source>Springer Books</source><creator>CHOO, Kim-Kwang Raymond ; BOYD, Colin ; HITCHCOCK, Yvonne</creator><creatorcontrib>CHOO, Kim-Kwang Raymond ; BOYD, Colin ; HITCHCOCK, Yvonne</creatorcontrib><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 3540306846</identifier><identifier>ISBN: 9783540306849</identifier><identifier>EISSN: 1611-3349</identifier><identifier>DOI: 10.1007/11593447_32</identifier><language>eng</language><publisher>Berlin: Springer</publisher><subject>Applied sciences ; Computer science; control theory; systems ; Cryptography ; Exact sciences and technology ; Information, signal and communications theory ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; Signal and communications theory ; Software ; Telecommunications and information theory</subject><ispartof>Lecture notes in computer science, 2005, p.585-604</ispartof><rights>2006 INIST-CNRS</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c2452-458af67c5426562fa7c012d1752edf5a017dadeeecbbbba890879bd475be41533</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>309,310,776,780,785,786,4036,4037,27902</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=17414492$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>CHOO, Kim-Kwang Raymond</creatorcontrib><creatorcontrib>BOYD, Colin</creatorcontrib><creatorcontrib>HITCHCOCK, Yvonne</creatorcontrib><title>Examining indistinguishability-based proof models for key establishment protocols</title><title>Lecture notes in computer science</title><subject>Applied sciences</subject><subject>Computer science; control theory; systems</subject><subject>Cryptography</subject><subject>Exact sciences and technology</subject><subject>Information, signal and communications theory</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>Signal and communications theory</subject><subject>Software</subject><subject>Telecommunications and information theory</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>3540306846</isbn><isbn>9783540306849</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2005</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNotjEtLxDAURoMPsI6z8g9047Kam9w0zVKG8QEDIui63Oah0b5oKth_b0XP5juLw8fYJfBr4FzfACgjEXUtxRHLoAQopERzzM6lQi55WWF5wrLVRGE0yjO2TemDr0hQ2piMPe-_qYt97N_y2LuY5tW-YnqnJrZxXoqGknf5OA1DyLvB-TblYZjyT7_kPs3UtGvb-X7-TebBDm26YKeB2uS3_7thr3f7l91DcXi6f9zdHgorUIkCVUWh1FahKFUpAmnLQTjQSngXFHHQjpz33jYrVBleadM41KrxCErKDbv6-x0pWWrDRL2NqR6n2NG01KAREI2QP6p5Vdw</recordid><startdate>2005</startdate><enddate>2005</enddate><creator>CHOO, Kim-Kwang Raymond</creator><creator>BOYD, Colin</creator><creator>HITCHCOCK, Yvonne</creator><general>Springer</general><scope>IQODW</scope></search><sort><creationdate>2005</creationdate><title>Examining indistinguishability-based proof models for key establishment protocols</title><author>CHOO, Kim-Kwang Raymond ; BOYD, Colin ; HITCHCOCK, Yvonne</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c2452-458af67c5426562fa7c012d1752edf5a017dadeeecbbbba890879bd475be41533</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2005</creationdate><topic>Applied sciences</topic><topic>Computer science; control theory; systems</topic><topic>Cryptography</topic><topic>Exact sciences and technology</topic><topic>Information, signal and communications theory</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>Signal and communications theory</topic><topic>Software</topic><topic>Telecommunications and information theory</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>CHOO, Kim-Kwang Raymond</creatorcontrib><creatorcontrib>BOYD, Colin</creatorcontrib><creatorcontrib>HITCHCOCK, Yvonne</creatorcontrib><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>CHOO, Kim-Kwang Raymond</au><au>BOYD, Colin</au><au>HITCHCOCK, Yvonne</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Examining indistinguishability-based proof models for key establishment protocols</atitle><btitle>Lecture notes in computer science</btitle><date>2005</date><risdate>2005</risdate><spage>585</spage><epage>604</epage><pages>585-604</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>3540306846</isbn><isbn>9783540306849</isbn><cop>Berlin</cop><pub>Springer</pub><doi>10.1007/11593447_32</doi><tpages>20</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0302-9743 |
ispartof | Lecture notes in computer science, 2005, p.585-604 |
issn | 0302-9743 1611-3349 |
language | eng |
recordid | cdi_pascalfrancis_primary_17414492 |
source | Springer Books |
subjects | Applied sciences Computer science control theory systems Cryptography Exact sciences and technology Information, signal and communications theory Memory and file management (including protection and security) Memory organisation. Data processing Signal and communications theory Software Telecommunications and information theory |
title | Examining indistinguishability-based proof models for key establishment protocols |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-29T05%3A55%3A43IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Examining%20indistinguishability-based%20proof%20models%20for%20key%20establishment%20protocols&rft.btitle=Lecture%20notes%20in%20computer%20science&rft.au=CHOO,%20Kim-Kwang%20Raymond&rft.date=2005&rft.spage=585&rft.epage=604&rft.pages=585-604&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=3540306846&rft.isbn_list=9783540306849&rft_id=info:doi/10.1007/11593447_32&rft_dat=%3Cpascalfrancis%3E17414492%3C/pascalfrancis%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |