Kim-Kwang Raymond Choo
University of Texas at San Antonio
151 papers found
Refreshing results…
Errors in Computational Complexity Proofs for Protocols
Download from www.researchgate.netOn Session Key Construction in Provably-Secure Key Establishment Protocols
Download from www.researchgate.netExamining Indistinguishability-Based Proof Models for Key Establishment Protocols
Download from link.springer.comA user-centric anonymous authorisation framework in e-commerce environment
UploadA Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model
Download from www.researchgate.netRefuting security proofs for tripartite key exchange with model checker in planning problem setting
Download from dx.doi.orgSecurity of Two-Party Identity-Based Key Agreement
Download from www.researchgate.netComplementing Computational Protocol Analysis with Formal Specifications
Download from link.springer.comMissing publications? Search for publications with a matching author name.