Search results for: Chris J. Mitchell
IEEE Transactions on Information Theory > 2016 > 62 > 11 > 6260 - 6267
Lecture Notes in Computer Science > Computational Intelligence and Security > Cryptographic Protocols > 149-154
Lecture Notes in Computer Science > Computational Intelligence and Security > Cryptographic Protocols > 192-197
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO 2000 > Message Authentication > 184-196
IFIP — The International Federation for Information Processing > Information Security Management, Education and Privacy > I-NetSec4 3rd Working Conference on Privacy and Anonymity in Networked and Distributed Systems > 183-199
Lecture Notes in Computer Science > Information and Communications Security > Key Management > 304-314
Lecture Notes in Computer Science > Security Protocols > 171-176
Lecture Notes in Computer Science > Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication > Lightweight Authentication > 54-68
IFIP — The International Federation for Information Processing > Security and Privacy in the Age of Ubiquitous Computing > Workshop Papers > 539-549
Lecture Notes in Computer Science > Foundations of Security Analysis and Design IV > Foundations of Security Analysis and Design > 282-323