ICITS   2009 International Conference on Information Theoretic Security
Wall of Fame | Most Viewed ICITS-2009 Paper
12 years 9 months ago
Cryptanalysis of Secure Message Transmission Protocols with Feedback
In the context of secure point-to-point message transmission in networks with minimal connectivity, previous studies showed that feedbacks from the receiver to the sender can be us...
Qiushi Yang, Yvo Desmedt
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
1Download preprint from source142
2Download preprint from source139
3Download preprint from source134
4Download preprint from source92
5Download preprint from source75
6Download preprint from source74
7Download preprint from source72
8Download preprint from source60
9Download preprint from source51