Examining indistinguishability-based proof models for key establishment protocols

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: CHOO, Kim-Kwang Raymond, BOYD, Colin, HITCHCOCK, Yvonne
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 604
container_issue
container_start_page 585
container_title
container_volume
creator CHOO, Kim-Kwang Raymond
BOYD, Colin
HITCHCOCK, Yvonne
description
doi_str_mv 10.1007/11593447_32
format Conference Proceeding
fullrecord <record><control><sourceid>pascalfrancis</sourceid><recordid>TN_cdi_pascalfrancis_primary_17414492</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>17414492</sourcerecordid><originalsourceid>FETCH-LOGICAL-c2452-458af67c5426562fa7c012d1752edf5a017dadeeecbbbba890879bd475be41533</originalsourceid><addsrcrecordid>eNotjEtLxDAURoMPsI6z8g9047Kam9w0zVKG8QEDIui63Oah0b5oKth_b0XP5juLw8fYJfBr4FzfACgjEXUtxRHLoAQopERzzM6lQi55WWF5wrLVRGE0yjO2TemDr0hQ2piMPe-_qYt97N_y2LuY5tW-YnqnJrZxXoqGknf5OA1DyLvB-TblYZjyT7_kPs3UtGvb-X7-TebBDm26YKeB2uS3_7thr3f7l91DcXi6f9zdHgorUIkCVUWh1FahKFUpAmnLQTjQSngXFHHQjpz33jYrVBleadM41KrxCErKDbv6-x0pWWrDRL2NqR6n2NG01KAREI2QP6p5Vdw</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Examining indistinguishability-based proof models for key establishment protocols</title><source>Springer Books</source><creator>CHOO, Kim-Kwang Raymond ; BOYD, Colin ; HITCHCOCK, Yvonne</creator><creatorcontrib>CHOO, Kim-Kwang Raymond ; BOYD, Colin ; HITCHCOCK, Yvonne</creatorcontrib><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 3540306846</identifier><identifier>ISBN: 9783540306849</identifier><identifier>EISSN: 1611-3349</identifier><identifier>DOI: 10.1007/11593447_32</identifier><language>eng</language><publisher>Berlin: Springer</publisher><subject>Applied sciences ; Computer science; control theory; systems ; Cryptography ; Exact sciences and technology ; Information, signal and communications theory ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; Signal and communications theory ; Software ; Telecommunications and information theory</subject><ispartof>Lecture notes in computer science, 2005, p.585-604</ispartof><rights>2006 INIST-CNRS</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c2452-458af67c5426562fa7c012d1752edf5a017dadeeecbbbba890879bd475be41533</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>309,310,776,780,785,786,4036,4037,27902</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=17414492$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>CHOO, Kim-Kwang Raymond</creatorcontrib><creatorcontrib>BOYD, Colin</creatorcontrib><creatorcontrib>HITCHCOCK, Yvonne</creatorcontrib><title>Examining indistinguishability-based proof models for key establishment protocols</title><title>Lecture notes in computer science</title><subject>Applied sciences</subject><subject>Computer science; control theory; systems</subject><subject>Cryptography</subject><subject>Exact sciences and technology</subject><subject>Information, signal and communications theory</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>Signal and communications theory</subject><subject>Software</subject><subject>Telecommunications and information theory</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>3540306846</isbn><isbn>9783540306849</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2005</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNotjEtLxDAURoMPsI6z8g9047Kam9w0zVKG8QEDIui63Oah0b5oKth_b0XP5juLw8fYJfBr4FzfACgjEXUtxRHLoAQopERzzM6lQi55WWF5wrLVRGE0yjO2TemDr0hQ2piMPe-_qYt97N_y2LuY5tW-YnqnJrZxXoqGknf5OA1DyLvB-TblYZjyT7_kPs3UtGvb-X7-TebBDm26YKeB2uS3_7thr3f7l91DcXi6f9zdHgorUIkCVUWh1FahKFUpAmnLQTjQSngXFHHQjpz33jYrVBleadM41KrxCErKDbv6-x0pWWrDRL2NqR6n2NG01KAREI2QP6p5Vdw</recordid><startdate>2005</startdate><enddate>2005</enddate><creator>CHOO, Kim-Kwang Raymond</creator><creator>BOYD, Colin</creator><creator>HITCHCOCK, Yvonne</creator><general>Springer</general><scope>IQODW</scope></search><sort><creationdate>2005</creationdate><title>Examining indistinguishability-based proof models for key establishment protocols</title><author>CHOO, Kim-Kwang Raymond ; BOYD, Colin ; HITCHCOCK, Yvonne</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c2452-458af67c5426562fa7c012d1752edf5a017dadeeecbbbba890879bd475be41533</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2005</creationdate><topic>Applied sciences</topic><topic>Computer science; control theory; systems</topic><topic>Cryptography</topic><topic>Exact sciences and technology</topic><topic>Information, signal and communications theory</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>Signal and communications theory</topic><topic>Software</topic><topic>Telecommunications and information theory</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>CHOO, Kim-Kwang Raymond</creatorcontrib><creatorcontrib>BOYD, Colin</creatorcontrib><creatorcontrib>HITCHCOCK, Yvonne</creatorcontrib><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>CHOO, Kim-Kwang Raymond</au><au>BOYD, Colin</au><au>HITCHCOCK, Yvonne</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Examining indistinguishability-based proof models for key establishment protocols</atitle><btitle>Lecture notes in computer science</btitle><date>2005</date><risdate>2005</risdate><spage>585</spage><epage>604</epage><pages>585-604</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>3540306846</isbn><isbn>9783540306849</isbn><cop>Berlin</cop><pub>Springer</pub><doi>10.1007/11593447_32</doi><tpages>20</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0302-9743
ispartof Lecture notes in computer science, 2005, p.585-604
issn 0302-9743
1611-3349
language eng
recordid cdi_pascalfrancis_primary_17414492
source Springer Books
subjects Applied sciences
Computer science
control theory
systems
Cryptography
Exact sciences and technology
Information, signal and communications theory
Memory and file management (including protection and security)
Memory organisation. Data processing
Signal and communications theory
Software
Telecommunications and information theory
title Examining indistinguishability-based proof models for key establishment protocols
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-29T05%3A55%3A43IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Examining%20indistinguishability-based%20proof%20models%20for%20key%20establishment%20protocols&rft.btitle=Lecture%20notes%20in%20computer%20science&rft.au=CHOO,%20Kim-Kwang%20Raymond&rft.date=2005&rft.spage=585&rft.epage=604&rft.pages=585-604&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=3540306846&rft.isbn_list=9783540306849&rft_id=info:doi/10.1007/11593447_32&rft_dat=%3Cpascalfrancis%3E17414492%3C/pascalfrancis%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true