
International Journal of Applied Cryptography
2008 Vol.1 No.2
Pages | Title and author(s) |
79-90 | Anonymous RFID authentication supporting constant-cost key-lookup against active adversariesM. Burmester, B. De Medeiros, R. Motta DOI: 10.1504/IJACT.2008.021082 |
91-107 | Securing group key exchange against strong corruptions and key registration attacksEmmanuel Bresson, Mark Manulis DOI: 10.1504/IJACT.2008.021083 |
108-119 | On the relation among various security models for certificateless cryptographyQiong Huang, Duncan S. Wong DOI: 10.1504/IJACT.2008.021084 |
120-132 | Efficient lattice-based signature schemeThomas Plantard, Willy Susilo, Khin Than Win, Qiong Huang DOI: 10.1504/IJACT.2008.021085 |
133-143 | An efficient one-move Nominative Signature schemeQiong Huang, Dennis Y.W. Liu, Duncan S. Wong DOI: 10.1504/IJACT.2008.021086 |
144-159 | The layered games framework for specifications and analysis of security protocolsAmir Herzberg, Igal Yoffe DOI: 10.1504/IJACT.2008.021087 |