Kim-Kwang Raymond Choo, Yvonne Hitchcock. Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols. In Colin Boyd, Juan Manuel González Nieto, editors, Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings. Volume 3574 of Lecture Notes in Computer Science, pages 429-442, Springer, 2005. [doi]
@inproceedings{ChooH05, title = {Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols}, author = {Kim-Kwang Raymond Choo and Yvonne Hitchcock}, year = {2005}, doi = {10.1007/11506157_36}, url = {http://dx.doi.org/10.1007/11506157_36}, tags = {protocol, security}, researchr = {https://researchr.org/publication/ChooH05}, cites = {0}, citedby = {0}, pages = {429-442}, booktitle = {Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, editor = {Colin Boyd and Juan Manuel González Nieto}, volume = {3574}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-26547-3}, }