Cited By
View all- (2017)A privacy-enhanced access log management mechanism in SSO systems from nominative signaturesInternational Journal of Applied Cryptography10.1504/IJACT.2017.0893733:4(394-406)Online publication date: 1-Jan-2017
- Boldyreva ALychev RYu TDanezis GGligor V(2012)Provable security of S-BGP and other path vector protocolsProceedings of the 2012 ACM conference on Computer and communications security10.1145/2382196.2382254(541-552)Online publication date: 16-Oct-2012
- Barbosa MFarshim P(2009)Security Analysis of Standard Authentication and Key Agreement Protocols Utilising TimestampsProceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology10.1007/978-3-642-02384-2_15(235-253)Online publication date: 19-Jun-2009
- Show More Cited By