Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols

Kim-Kwang Raymond Choo, Yvonne Hitchcock. Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols. In Colin Boyd, Juan Manuel González Nieto, editors, Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings. Volume 3574 of Lecture Notes in Computer Science, pages 429-442, Springer, 2005. [doi]

@inproceedings{ChooH05,
  title = {Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols},
  author = {Kim-Kwang Raymond Choo and Yvonne Hitchcock},
  year = {2005},
  doi = {10.1007/11506157_36},
  url = {http://dx.doi.org/10.1007/11506157_36},
  tags = {protocol, security},
  researchr = {https://researchr.org/publication/ChooH05},
  cites = {0},
  citedby = {0},
  pages = {429-442},
  booktitle = {Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  editor = {Colin Boyd and Juan Manuel González Nieto},
  volume = {3574},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {3-540-26547-3},
}