First Page | Document Content | |
---|---|---|
Date: 2007-12-09 02:25:32XDH assumption Decisional Diffie–Hellman assumption Electronic money Public-key cryptography Proof of knowledge XTR Cryptography Cryptographic protocols Diffie–Hellman key exchange | Practical Anonymous Divisible E-Cash From Bounded Accumulators? Man Ho Au, Willy Susilo, and Yi Mu Centre for Computer and Information Security Research School of Computer Science and Software Engineering University of WAdd to Reading ListSource URL: eprint.iacr.orgDownload Document from Source WebsiteFile Size: 335,19 KBShare Document on Facebook |
On the Robustness of some Cryptographic Protocols for Mobile Agent Protection Volker Roth Fraunhofer Institut f¨ur Graphische Datenverarbeitung Rundeturmstraße 6, 64283 Darmstadt, GermanyDocID: 1uZJK - View Document | |
Verifying Cryptographic Protocols in Applied Pi Calculus Mark Ryan Ben SmythDocID: 1uXvn - View Document | |
Secure Cryptographic Protocols for E-commerce Transaction on the InternetDocID: 1uDkO - View Document | |
Type-Based Automated Verification of Authenticity in Cryptographic Protocols Daisuke Kikuchi and Naoki Kobayashi Graduate School of Information Sciences, Tohoku University {kikuchi,koba}@kb.ecei.tohoku.ac.jpDocID: 1u5Us - View Document | |
Cryptographic schemes Protocols Specifications of primitivesDocID: 1u4P2 - View Document |