Two types of key-compromise impersonation attacks against one-pass key establishment protocols
Year of publication: |
2008
|
---|---|
Authors: | Chalkias, K. ; Baldimtsi, F. ; Hristu-Varsakelis, D. ; Stephanides, G. |
Published in: |
E-business and telecommunications : 4th international conference ; revised selected papers. - Berlin : Springer, ISBN 978-3-540-88652-5. - 2008, p. 227-238
|
Subject: | Computernetz | Computer network | Zutrittskontrolle | User access control | IT-Kriminalität | IT crime | Datensicherheit | Data security | Theorie | Theory |
-
A security hardening language based on aspect-orientation
Mourad, Azzam, (2008)
-
E-business and telecommunications : 4th international conference ; revised selected papers
Filipe, Joaquim, (2008)
-
Design of a password-based EAP method
Manganaro, Andrea, (2008)
- More ...
-
Optimizing production with energy and GHG emission constraints in Greece: An input-output analysis
Hristu-Varsakelis, D., (2010)
-
A decision support model for tax revenue collection in Greece
Goumagias, N.D., (2012)
-
Optimizing production with energy and GHG emission constraints in Greece: An input–output analysis
Hristu-Varsakelis, D., (2010)
- More ...