Sciweavers

10 search results - page 1 / 2
» ac 1997
Sort
View
AC
1997
Springer
15 years 2 months ago
Internet Security Protocols
Walter Fumy
IJCAI
1997
14 years 11 months ago
Equational Reasoning using AC Constraints
Unfailing completion is a commonly used technique for equational reasoning. For equational problems with associative and commutative functions, unfailing completion often generate...
David A. Plaisted, Yunshan Zhu
90
Voted
AC
1997
Springer
15 years 2 months ago
Cryptographic Primitives for Information Authentication - State of the Art
This paper describes the state of the art for cryptographic primitives that are used for protecting the authenticity of information: cryptographic hash functions and digital signat...
Bart Preneel