Kim-Kwang Raymond Choo Refuting Security Proofs for Tripartite Key Exchange with Model Checker in Planning Problem Setting. [Citation Graph (0, 0)][DBLP] CSFW, 2006, pp:297-308 [Conf]
Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock The importance of proofs of security for key establishment protocols: Formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:15, pp:2788-2797 [Journal]
Kim-Kwang Raymond Choo On the Security Analysis of Lee, Hwang & Lee (2004) and Song & Kim (2000) Key Exchange / Agreement Protocols. [Citation Graph (0, 0)][DBLP] Informatica, Lith. Acad. Sci., 2006, v:17, n:4, pp:467-480 [Journal]
Security Improvements to Anonymous ID-Based Group Key Agreement for Wireless Networks. [Citation Graph (, )][DBLP]
Secret Signatures: How to Achieve Business Privacy Efficiently? [Citation Graph (, )][DBLP]
A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model. [Citation Graph (, )][DBLP]
Privacy on the Line: The Politics of Wiretapping and Encryption, Updated and Expanded Edition. [Citation Graph (, )][DBLP]
Search in 0.004secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP