×

Found 8 Documents (Results 1–8)

An authorization model and its formal semantics. (English) Zbl 1487.68054

Quisquater, Jean-Jacques (ed.) et al., Computer security – ESORICS 98. 5th European symposium on research in computer security, Louvain-la-Neuve, Belgium, September 16–18, 1998 Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1485, 127-142 (1998).
MSC:  68M25 03B70
PDFBibTeX XMLCite
Full Text: DOI

Security amplification by composition: The case of doubly-iterated, ideal ciphers. (English) Zbl 0931.94011

Krawczyk, Hugo (ed.), Advances in cryptology - CRYPTO ’98. 18th annual international cryptology conference, Santa Barbara, CA, USA, August 23–27, 1998. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1462, 390-407 (1998).
MSC:  94A60
PDFBibTeX XMLCite

Relations among notions of security for public-key encryption schemes. (English) Zbl 0931.94014

Krawczyk, Hugo (ed.), Advances in cryptology - CRYPTO ’98. 18th annual international cryptology conference, Santa Barbara, CA, USA, August 23–27, 1998. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1462, 26-45 (1998).
MSC:  94A60
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 3

Main Field