ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
15
views
0
references
Top references
cited by
29
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,371
similar
All similar
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Reasoning about belief in cryptographic protocols
proceedings-article
Author(s):
L. Gong
,
R. Needham
,
R. Yahalom
Publication date
(Print):
1990
Conference name:
Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy
Conference date:
June 7, 1990 - June 9, 1990
Read this article at
ScienceOpen
Publisher
Review
Review article
Invite someone to review
Bookmark
Cite as...
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
JMIR: Research Protocols
Author and article information
Conference
Publication date (Print):
1990
Pages
: 234-248
Article
DOI:
10.1109/RISP.1990.63854
SO-VID:
69d434ba-0ca2-4752-b61c-01c97022caa0
Copyright ©
© 1990
Conference name:
Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy
Conference location:
Oakland, CA, USA
Conference date:
June 7, 1990 - June 9, 1990
History
Data availability:
Comments
Comment on this article
Sign in to comment
scite_
Similar content
3,371
Comparative analysis of cryptographic algorithms
Authors:
Z Hercigonja
Back Propagation Neural Network Based Leakage Characterization for Practical Security Analysis of Cryptographic Implementations
Authors:
Shuguo Yang
,
Yongbin Zhou
,
Jiye Liu
…
Assessing the Performance of OpenTitan as Cryptographic Accelerator in Secure Open-Hardware System-on-Chips
Authors:
Emanuele Parisi
,
Alberto Musa
,
Maicol Ciani
…
See all similar
Cited by
29
Provably Secure Remote Truly Three-Factor Authentication Scheme With Privacy Protection on Biometrics
Authors:
Chun-I Fan
,
Yi-Hui Lin
Privacy-Preserving Schemes for Ad Hoc Social Networks: A Survey
Authors:
Mohamed Amine Ferrag
,
Leandros Maglaras
,
Ahmed Ahmim
Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G: SCN-SI-75
Authors:
Kai Fan
,
Yuanyuan Gong
,
Chen Liang
…
See all cited by