Security Properties of Two Authenticated Conference Key Agreement Protocols

Qiang Tang, Chris J. Mitchell. Security Properties of Two Authenticated Conference Key Agreement Protocols. In Sihan Qing, Wenbo Mao, Javier Lopez, Guilin Wang, editors, Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings. Volume 3783 of Lecture Notes in Computer Science, pages 304-314, Springer, 2005. [doi]

@inproceedings{TangM05:5,
  title = {Security Properties of Two Authenticated Conference Key Agreement Protocols},
  author = {Qiang Tang and Chris J. Mitchell},
  year = {2005},
  doi = {10.1007/11602897_26},
  url = {http://dx.doi.org/10.1007/11602897_26},
  tags = {protocol, security},
  researchr = {https://researchr.org/publication/TangM05%3A5},
  cites = {0},
  citedby = {0},
  pages = {304-314},
  booktitle = {Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings},
  editor = {Sihan Qing and Wenbo Mao and Javier Lopez and Guilin Wang},
  volume = {3783},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {3-540-30934-9},
}