SCN   2010 Simulation of Computer Networks
Wall of Fame | Most Viewed SCN-2010 Paper
232views Communications» more  SCN 2010»
12 years 9 months ago
Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model
Serge Vaudenay [20] introduced a notion of Message Authentication (MA) protocols in the Short Authenticated String (SAS) model. A SAS-MA protocol authenticates arbitrarily long mes...
Stanislaw Jarecki, Nitesh Saxena
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
1Download preprint from source232
2Download preprint from source187
3Download preprint from source176
4Download preprint from source163
5Download preprint from source147
6Download preprint from source145
7Download preprint from source145
8Download preprint from source144
9Download preprint from source143
10Download preprint from source142
11Download preprint from source138
12Download preprint from source132
13Download preprint from source129
14Download preprint from source127
15Download preprint from source124
16Download preprint from source122
17Download preprint from source122
18Download preprint from source122
19Download preprint from source120
20Download preprint from source116
21Download preprint from source113
22Download preprint from source111
23Download preprint from source109
24Download preprint from source101
25Download preprint from source97