Entry Book:1985:SNS from tcs1985.bib
Last update: Thu Sep 27 02:46:57 MDT 2018
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Book:1985:SNS,
author = "R. V. Book and F. Otto",
title = "On the security of name-stamp protocols",
journal = j-THEOR-COMP-SCI,
volume = "39",
number = "2--3",
pages = "319--325",
month = aug,
year = "1985",
CODEN = "TCSCDI",
ISSN = "0304-3975 (print), 1879-2294 (electronic)",
ISSN-L = "0304-3975",
bibdate = "Sat Nov 22 13:29:49 MST 1997",
bibsource = "http://www.math.utah.edu/pub/tex/bib/tcs1985.bib",
acknowledgement = ack-nhfb,
classification = "C5620 (Computer networks and techniques); C6130
(Data handling techniques)",
corpsource = "Dept. of Math., California Univ., Santa Barbara, CA,
USA",
fjournal = "Theoretical Computer Science",
journal-URL = "http://www.sciencedirect.com/science/journal/03043975/",
keywords = "cryptography; name-stamp protocols; p-parity cascade
protocols; protocols; security; two-party cascade
protocols",
pubcountry = "Netherlands A15",
treatment = "T Theoretical or Mathematical",
}
Related entries
- Book, R. V.,
37(2)123,
40(2)101,
40(2)237
- C5620,
40(2)101,
48(1)75,
53(2)281,
57(1)97
- C6130,
40(2)101,
46(2)261,
50(2)137,
50(3)323,
52(3)193,
54(2)315,
66(1)45,
66(2)137
- cascade,
47(1)1
- cryptography,
40(2)101,
47(1)85,
48(2)283,
66(1)45
- data,
35(2)329,
36(2)251,
37(3)269,
38(1)83,
39(2)107,
40(2)101,
42(2)123,
45(1)1,
45(3)293,
46(1)13,
46(2)261,
48(1)75,
48(2)273,
48(2)297,
49(2)171,
49(2)239,
50(2)103,
50(2)137,
50(3)323,
51(1)129,
51(1)205,
52(3)193,
53(2)169,
53(2)281,
54(1)53,
54(2)315,
55(2)265,
56(1)59,
56(3)345,
57(1)3,
57(1)131,
57(2)225,
58(0)3,
58(1)57,
58(1)143,
59(1)85,
59(3)211,
59(3)259,
60(3)297,
62(0)3,
62(1)3,
62(3)251,
63(1)63,
63(2)113,
63(3)303,
64(1)55,
66(0)117,
66(1)45,
66(2)137,
66(2)181,
67(1)87,
68(1)37,
68(1)57,
69(2)117
- handling,
40(2)101,
46(1)13,
46(2)261,
50(2)137,
50(3)323,
52(3)193,
54(2)315,
66(1)45,
66(2)137
- network,
36(1)59,
36(1)119,
37(2)183,
38(1)133,
40(2)101,
40(2)275,
41(1)19,
43(2)277,
44(1)69,
44(3)247,
47(1)15,
47(3)323,
48(1)75,
48(2)135,
49(2)171,
49(2)z,
52(3)193,
53(2)281,
54(1)53,
57(1)97,
58(1)183,
61(1)49,
61(2)175,
63(2)223,
64(1)83,
64(1)125,
64(2)191,
64(2)203,
66(1)15,
68(1)19
- Otto, F.,
35(2)227,
40(2)101,
47(1)27,
47(2)225,
67(2)143,
68(3)319
- party, two-,
40(2)101
- protocol,
40(2)101,
54(1)53,
57(1)97,
68(2)175
- technique,
40(1)67,
40(2)101,
45(1)87,
46(2)261,
48(1)75,
49(1)81,
49(2)171,
50(2)137,
50(3)323,
51(1)53,
52(3)193,
53(2)169,
53(2)281,
54(1)53,
54(1)87,
54(1)129,
54(2)315,
57(0)3,
57(1)97,
57(1)131,
57(1)147,
57(1)153,
58(1)103,
58(1)209,
59(1)157,
59(3)297,
61(2)299,
63(3)275,
63(3)295,
64(1)107,
64(2)135,
64(2)175,
65(1)1,
65(2)123,
65(2)131,
65(2)149,
65(2)153,
65(2)189,
65(2)197,
65(2)213,
65(2)243,
65(2)249,
66(0)117,
66(1)45,
66(2)137,
67(1)5,
67(1)37,
67(1)87,
68(3)267,
69(1)1
- two-party,
40(2)101