Last update: Sun Oct 15 02:36:41 MDT 2017
@Article{Bouman:2011:SAW, author = "Niek J. Bouman and Serge Fehr", title = "Secure Authentication from a Weak Key, without Leaking Information", journal = j-LECT-NOTES-COMP-SCI, volume = "6632", pages = "246--265", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-20465-4_15", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Sat Dec 15 17:44:03 MST 2012", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_15", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", }