Author of the publication

SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key.

, , and . WISTP, volume 6633 of Lecture Notes in Computer Science, page 54-68. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Beyond Cookie Monster Amnesia: Real World Persistent Online Tracking., , and . CoRR, (2019)A fast modular exponentiation for rsa on systolic arrays., , and . Int. J. Comput. Math., 63 (3-4): 215-226 (1997)On the security of a structural proven signer ordering multisignature scheme., and . Communications and Multimedia Security, volume 228 of IFIP Conference Proceedings, page 1-8. Kluwer, (2002)Analysing the Security of Google's Implementation of OpenID Connect., and . DIMVA, volume 9721 of Lecture Notes in Computer Science, page 357-376. Springer, (2016)Key Recovery and Forgery Attacks on the MacDES MAC Algorithm., , and . CRYPTO, volume 1880 of Lecture Notes in Computer Science, page 184-196. Springer, (2000)The Hsu-Harn-Mu-Zhang-Zhu group key establishment protocol is insecure.. CoRR, (2018)Interoperation Between a Conventional PKI and an ID-Based Infrastructure., and . EuroPKI, volume 3545 of Lecture Notes in Computer Science, page 73-85. Springer, (2005)Comments on mutual authentication and key exchange protocols for low power wireless communications., and . IEEE Communications Letters, 8 (4): 262-263 (2004)On the Security of 2-Key Triple DES.. IEEE Trans. Inf. Theory, 62 (11): 6260-6267 (2016)Aperiodic and semi-periodic perfect maps.. IEEE Trans. Inf. Theory, 41 (1): 88-95 (1995)