𝔖 Bobbio Scriptorium
✦   LIBER   ✦

An attack on the Interlock Protocol when used for authentication

✍ Scribed by Bellovin, S.M.; Merritt, M.


Book ID
114539910
Publisher
IEEE
Year
1994
Tongue
English
Weight
342 KB
Volume
40
Category
Article
ISSN
0018-9448

No coin nor oath required. For personal study only.


πŸ“œ SIMILAR VOLUMES


An error-in-variables method for use whe
✍ Ahmet Giz πŸ“‚ Article πŸ“… 1998 πŸ› John Wiley and Sons 🌐 English βš– 471 KB πŸ‘ 2 views

Two new error-in-variables methods to estimate the reactivity ratios are developed. These are based on variants of the Skeist solution of the copolymerization equation. One method is suitable when one of the reactivity ratios is close to one and the other is for use when both ratios are close to one

[Lecture Notes of the Institute for Comp
✍ SΓ©nac, Patrick; Ott, Max; Seneviratne, Aruna πŸ“‚ Article πŸ“… 2012 πŸ› Springer Berlin Heidelberg 🌐 English βš– 228 KB

This book constitutes the thoroughly refereed post-conference proceedings of the First International ICST Conference on Wireless Communications and Applications, ICWCA 2011, held in Sanya, China, in August 2011. The 43 revised full papers presented were carefully reviewed and selected from around 90