Results 1 - 10
of
38,201
TABLE I Security Analysis of Protocol I
2002
Cited by 126
TABLE II Security Analysis of Protocol II
2002
Cited by 126
Table 4.2 Security Analysis of Protocol
Table 1: Security Analysis of Protocols Protected Number of Total number Number of
2002
"... In PAGE 9: ... Therefore, the disclosure risk in this method is based on the number of data values that the other party might know from some external source. Table1 presents the number of unknowns and equations generated for protocols I and II. Two rows are given for each protocol/party: One for the basic protocol, and one for the additional step needed to protect boolean values as described in Section 5.... ..."
Cited by 126
Table 1: Security Analysis of Protocol Protected Number of Total number Number of
2002
Cited by 126
Table 1: Analysis of Provably Secure Group Key Exchange Protocols Protocol Model(s) Assumption(s) Corr. S/D
2006
Cited by 1
Table 1: Analysis of Security Models for Group Key Exchange Protocols Model IND MA FS CON Strong Corr. S/D
2006
Cited by 2
Table 1: Analysis of Security Models for Group Key Exchange Protocols Model IND MA FS CON Strong Corr. S/D
2006
Cited by 2
Table 1: Analysis of Security Models for Group Key Exchange Protocols Model IND MA FS CON Strong Corr. S/D
2006
Cited by 2
Results 1 - 10
of
38,201