Protocols Using Keys from Faulty Data (Transcript of Discussion)

David Wheeler. Protocols Using Keys from Faulty Data (Transcript of Discussion). In Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe, editors, Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers. Volume 2467 of Lecture Notes in Computer Science, pages 180-187, Springer, 2001. [doi]

References

No references recorded for this publication.

Cited by

No citations of this publication recorded.