A model for secure protocols and its application to systematic design of cryptographic protocols
Rudolph, Carsten (2001) A model for secure protocols and its application to systematic design of cryptographic protocols. .
Impact and interest:
Citation countsare sourced monthly fromand citation databases.
These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.
Citations counts from theindexing service can be viewed at the linked Google Scholar™ search.
|Item Type:||QUT Thesis (PhD)|
|Additional Information:||Presented to the Information Security Research Centre, School of Data Communications, Queensland University of Technology.|
|Keywords:||Cryptography, Computer security, cryptographic protocols, formal notion of security, secure protocol design, formal methods, abstract secure channels, non-malleability, indistinguishability, asynchronous product automata, key establishment protocols, key agreement, key confirmation, thesis, doctoral|
|Institution:||Queensland University of Technology|
|Copyright Owner:||Copyright Carsten Rudolph|
|Deposited On:||22 Sep 2010 23:06|
|Last Modified:||09 Feb 2011 23:55|
Repository Staff Only: item control page