ESORICS   2005 European Symposium on Research in Computer Security
Wall of Fame | Most Viewed ESORICS-2005 Paper
10 years 12 months ago
Machine-Checked Security Proofs of Cryptographic Signature Schemes
Abstract. Formal methods have been extensively applied to the certiļ¬cation of cryptographic protocols. However, most of these works make the perfect cryptography assumption, i.e....
Sabrina Tarento
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
1Download preprint from source161
2Download preprint from source134
3Download preprint from source125
4Download preprint from source124
5Download preprint from source119
6Download preprint from source112
7Download preprint from source109
8Download preprint from source102
9Download preprint from source101
10Download preprint from source96
11Download preprint from source95
12Download preprint from source87
13Download preprint from source84
14Download preprint from source83