Login / Signup
Posets and protocols-picking the right three-party protocol.
Siaw-Lynn Ng
Published in:
IEEE J. Sel. Areas Commun. (2003)
Keyphrases
</>
cryptographic protocols
network protocols
security protocols
communication protocol
multi party non repudiation
communication protocols
authentication protocol
voting protocols
key agreement protocol
key distribution
fair exchange protocols
concurrency control protocols
contractual obligations
protocol specification
multi party
transaction processing systems
locking protocol
medium access control
trusted third party
group communication
message delivery
message overhead
secure multiparty computation
messages exchanged
fair exchange
open archives initiative
mutual authentication
lightweight
distributed databases
key exchange
formal analysis
security analysis
public key cryptosystems
wireless medium
security properties
partially ordered sets
privacy preserving
correctness criteria
smart card
network simulator
transport layer
medium access
ns simulator
rfid systems
private information retrieval
commit protocols
homomorphic encryption
key establishment
delay tolerant