Sciweavers

TCS   2002 International Conference on Theoretical Computer Science
Wall of Fame | Most Viewed TCS-2002 Paper
TCS
2002
13 years 4 months ago
Authentication tests and the structure of bundles
Suppose a principal in a cryptographic protocol creates and transmits a message containing a new value v, later receiving v back in a different cryptographic context. It can concl...
Joshua D. Guttman, F. Javier Thayer
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
IdReadViewsTitleStatus
1Download preprint from source156
2Download preprint from source155
3Download preprint from source152
4Download preprint from source145
5Download preprint from source143
6Download preprint from source135
7Download preprint from source134
8Download preprint from source128
9Download preprint from source114
10Download preprint from source113
11Download preprint from source109
12Download preprint from source109
13Download preprint from source109
14Download preprint from source108
15Download preprint from source105
16Download preprint from source105
17Download preprint from source105
18Download preprint from source100
19Download preprint from source100
20Download preprint from source99
21Download preprint from source98
22Download preprint from source97
23Download preprint from source97
24Download preprint from source96
25Download preprint from source95
26Download preprint from source95
27Download preprint from source94
28Download preprint from source94
29Download preprint from source94
30Download preprint from source93
31Download preprint from source93
32Download preprint from source92
33Download preprint from source92
34Download preprint from source90
35Download preprint from source88
36Download preprint from source88
37Download preprint from source87
38Download preprint from source87
39Download preprint from source86
40Download preprint from source84
41Download preprint from source82
42Download preprint from source81
43Download preprint from source80
44Download preprint from source79
45Download preprint from source79
46Download preprint from source79
47Download preprint from source78
48Download preprint from source77
49Download preprint from source77
50Download preprint from source76
51Download preprint from source73
52Download preprint from source70
53Download preprint from source70
54Download preprint from source69
55Download preprint from source69
56Download preprint from source69
57Download preprint from source67
58Download preprint from source63
59Download preprint from source60