Sciweavers

10 search results - page 1 / 2
» ac 1997
Sort
View
AC
1997
Springer
13 years 9 months ago
Internet Security Protocols
Walter Fumy
IJCAI
1997
13 years 6 months ago
Equational Reasoning using AC Constraints
Unfailing completion is a commonly used technique for equational reasoning. For equational problems with associative and commutative functions, unfailing completion often generate...
David A. Plaisted, Yunshan Zhu
AC
1997
Springer
13 years 9 months ago
Cryptographic Primitives for Information Authentication - State of the Art
This paper describes the state of the art for cryptographic primitives that are used for protecting the authenticity of information: cryptographic hash functions and digital signat...
Bart Preneel