First Page | Document Content | |
---|---|---|
Date: 2013-04-29 11:09:46Burrows–Abadi–Needham logic Needham–Schroeder protocol Public-key cryptography Cryptographic nonce XTR Deniable authentication Security protocol notation Wide Mouth Frog protocol Cryptographic protocols Cryptography Data | NRL Release Number[removed]The Logic of Authentication Protocols ?Add to Reading ListSource URL: www.nrl.navy.milDownload Document from Source WebsiteFile Size: 492,12 KBShare Document on Facebook |
Improved Group Off-the-Record Messaging Hong Liu Eugene Y. Vasserman Nicholas HopperDocID: 1juQC - View Document | |
POSTER: Deniable Anonymous Group Authentication Ewa Syta Ph.D. Student Yale University Email:DocID: 1e7g2 - View Document | |
Belief Change and Cryptographic Protocol Verification Aaron Hunter and James P. Delgrande School of Computing Science Simon Fraser University Burnaby, BC, Canada {amhunter, jim}@cs.sfu.caDocID: 15fhp - View Document | |
Microsoft Word - DA standarden.docDocID: 134tk - View Document | |
Off-the-Record Communication, or, Why Not To Use PGP Nikita Borisov UC Berkeley Ian GoldbergDocID: 12cQ4 - View Document |