Search results for: Refik Molva
Lecture Notes in Computer Science > Information, Security and Cryptology – ICISC 2009 > Cryptographic Protocol > 274-299
Lecture Notes in Computer Science > Financial Cryptography and Data Security > Digital Signing Methods > 72-87
Lecture Notes in Computer Science > Security Protocols > 199-209
Lecture Notes in Computer Science > Security and Cryptography for Networks > Applied Authentication > 321-335
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO ’91 > Protocol Design and Analysis > 44-61
Lecture Notes in Computer Science > Information and Communications Security > Session 2A. Authentication > 218-234
Lecture Notes in Computer Science > NETWORKING 2005. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems > Ad Hoc Networks I > 486-498
Lecture Notes in Computer Science