46
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Book Chapter: not found
      Theory of Cryptography 

      Intrusion-Resilience Via the Bounded-Storage Model

      other
      Springer Berlin Heidelberg

      Read this book at

      Buy book Bookmark
          There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references20

          • Record: found
          • Abstract: not found
          • Book Chapter: not found

          Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Authentication and authenticated key exchanges

              Bookmark
              • Record: found
              • Abstract: not found
              • Book Chapter: not found

              A Forward-Secure Public-Key Encryption Scheme

                Bookmark

                Author and book information

                Book Chapter
                2006
                : 207-224
                10.1007/11681878_11
                5c819d67-d789-470b-bf73-6ab0f343577f
                History

                Comments

                Comment on this book

                Book chapters

                Similar content3,165

                Cited by17