Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols

Kim-Kwang Raymond Choo, Yvonne Hitchcock. Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols. In Colin Boyd, Juan Manuel González Nieto, editors, Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings. Volume 3574 of Lecture Notes in Computer Science, pages 429-442, Springer, 2005. [doi]

Abstract

Abstract is missing.