2002
DOI: 10.1007/3-540-36231-2_16
|View full text |Cite
|
Sign up to set email alerts
|

Authentication of Concast Communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2004
2004
2011
2011

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(7 citation statements)
references
References 14 publications
0
7
0
Order By: Relevance
“…It is shown in [1] that Scheme 3 is secure if the underlying signature scheme is secure. Unfortunately, we have already observed that the underlying signature scheme is not secure.…”
Section: Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…It is shown in [1] that Scheme 3 is secure if the underlying signature scheme is secure. Unfortunately, we have already observed that the underlying signature scheme is not secure.…”
Section: Methodsmentioning
confidence: 99%
“…However, in Scheme 3 from [1], a different verification procedure is suggested, which can be described as follows:…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…History shows that secure batch verification algorithms are tricky to construct; a number of schemes were presented and subsequently broken or shown to be otherwise flawed. One example is the scheme of Al-Ibrahim et al [1], which was broken by Stinson in [39]. Camenisch et al list and reference ten proposed schemes which were later broken [8, §1.2].…”
Section: Definition 11 ([8])mentioning
confidence: 99%