ASICS: authenticated key exchange security incorporating certification systems. Boyd, C., Cremers, C., Feltz, M., Paterson, K. G., Poettering, B., & Stebila, D. International Journal of Information Security, 16(2):151–171, April, 2017.
Paper doi bibtex @Article{Boyd:2017:AAK,
author = "Colin Boyd and Cas Cremers and Mich{\`e}le Feltz and
Kenneth G. Paterson and Bertram Poettering and Douglas
Stebila",
title = "{ASICS}: authenticated key exchange security
incorporating certification systems",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "2",
pages = "151--171",
month = apr,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0312-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:47 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0312-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
Downloads: 0
{"_id":"eSLmqTqJDK9v3bfnE","bibbaseid":"boyd-cremers-feltz-paterson-poettering-stebila-asicsauthenticatedkeyexchangesecurityincorporatingcertificationsystems-2017","authorIDs":[],"author_short":["Boyd, C.","Cremers, C.","Feltz, M.","Paterson, K. G.","Poettering, B.","Stebila, D."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Colin"],"propositions":[],"lastnames":["Boyd"],"suffixes":[]},{"firstnames":["Cas"],"propositions":[],"lastnames":["Cremers"],"suffixes":[]},{"firstnames":["Michèle"],"propositions":[],"lastnames":["Feltz"],"suffixes":[]},{"firstnames":["Kenneth","G."],"propositions":[],"lastnames":["Paterson"],"suffixes":[]},{"firstnames":["Bertram"],"propositions":[],"lastnames":["Poettering"],"suffixes":[]},{"firstnames":["Douglas"],"propositions":[],"lastnames":["Stebila"],"suffixes":[]}],"title":"ASICS: authenticated key exchange security incorporating certification systems","journal":"International Journal of Information Security","volume":"16","number":"2","pages":"151–171","month":"April","year":"2017","coden":"????","doi":"https://doi.org/10.1007/s10207-015-0312-y","issn":"1615-5262 (print), 1615-5270 (electronic)","issn-l":"1615-5262","bibdate":"Tue Jan 23 16:01:47 MST 2018","bibsource":"https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib","url":"http://link.springer.com/article/10.1007/s10207-015-0312-y","acknowledgement":"Nelson H. F. Beebe, University of Utah, Department of Mathematics, 110 LCB, 155 S 1400 E RM 233, Salt Lake City, UT 84112-0090, USA, Tel: +1 801 581 5254, e-mail: \\path|beebe@math.utah.edu|, \\path|beebe@acm.org|, \\path|beebe@computer.org| (Internet), URL: \\path|https://www.math.utah.edu/ beebe/|","fjournal":"International Journal of Information Security","journal-url":"https://link.springer.com/journal/10207","bibtex":"@Article{Boyd:2017:AAK,\n author = \"Colin Boyd and Cas Cremers and Mich{\\`e}le Feltz and\n Kenneth G. Paterson and Bertram Poettering and Douglas\n Stebila\",\n title = \"{ASICS}: authenticated key exchange security\n incorporating certification systems\",\n journal = j-INT-J-INFO-SEC,\n volume = \"16\",\n number = \"2\",\n pages = \"151--171\",\n month = apr,\n year = \"2017\",\n CODEN = \"????\",\n DOI = \"https://doi.org/10.1007/s10207-015-0312-y\",\n ISSN = \"1615-5262 (print), 1615-5270 (electronic)\",\n ISSN-L = \"1615-5262\",\n bibdate = \"Tue Jan 23 16:01:47 MST 2018\",\n bibsource = \"https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib\",\n URL = \"http://link.springer.com/article/10.1007/s10207-015-0312-y\",\n acknowledgement = ack-nhfb,\n fjournal = \"International Journal of Information Security\",\n journal-URL = \"https://link.springer.com/journal/10207\",\n}\n\n","author_short":["Boyd, C.","Cremers, C.","Feltz, M.","Paterson, K. G.","Poettering, B.","Stebila, D."],"key":"Boyd:2017:AAK","id":"Boyd:2017:AAK","bibbaseid":"boyd-cremers-feltz-paterson-poettering-stebila-asicsauthenticatedkeyexchangesecurityincorporatingcertificationsystems-2017","role":"author","urls":{"Paper":"http://link.springer.com/article/10.1007/s10207-015-0312-y"},"metadata":{"authorlinks":{}},"downloads":0},"bibtype":"article","biburl":"ftp.math.utah.edu/pub/tex/bib/intjinfosec.bib","creationDate":"2020-08-03T18:34:53.215Z","downloads":0,"keywords":[],"search_terms":["asics","authenticated","key","exchange","security","incorporating","certification","systems","boyd","cremers","feltz","paterson","poettering","stebila"],"title":"ASICS: authenticated key exchange security incorporating certification systems","year":2017,"dataSources":["fYGRSD8HXJYwZPaY7","fEXH7XH8oyBtpzKFi"]}