1
Published 2009
Springer Berlin Heidelberg
Table of Contents: ... Veto Protocol -- A 2-Round Anonymous Veto Protocol -- How to Speak an Authentication Secret Securely...

2
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... Problem for Cryptographic Protocols Solved? -- Secure Sessions from Weak Secrets -- Secure Sessions from...

3
Published 2007
Springer Berlin Heidelberg
Table of Contents: ... Protocols for Secret Societies).-The Dining Freemasons (Security Protocols for Secret Societies) --...

4
Published 1998
Springer Berlin Heidelberg
Table of Contents: ...-recovery systems for RSA -- A weakness of the Menezes-Vanstone cryptosystem -- On ideal non-perfect secret...

5
Published 2000
Springer Berlin Heidelberg
Table of Contents: ... -- Auditing against Impossible Abstractions -- What is Authentication? -- Relations Between Secrets...