1999
DOI: 10.1093/comjnl/42.1.51
|View full text |Cite
|
Sign up to set email alerts
|

A  -restricted key agreement scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2004
2004
2014
2014

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(7 citation statements)
references
References 14 publications
0
7
0
Order By: Relevance
“…In the KAS model of Blundo et al [15], an eavesdropped conference is uncorrupted. We show that if it can contain a corrupted user, the revised model will be strictly stronger than the original one.…”
Section: Our Resultsmentioning
confidence: 99%
See 4 more Smart Citations
“…In the KAS model of Blundo et al [15], an eavesdropped conference is uncorrupted. We show that if it can contain a corrupted user, the revised model will be strictly stronger than the original one.…”
Section: Our Resultsmentioning
confidence: 99%
“…For τ > 1, every previous τ -time KAS needs a global counter to maintain the number of conferences executed so far. This assumption has been assumed in [12,15]. Practically, this could be hard to realize even if Ref.…”
Section: Our Resultsmentioning
confidence: 99%
See 3 more Smart Citations