2011
DOI: 10.3233/fi-2011-592
|View full text |Cite
|
Sign up to set email alerts
|

Algebraic Framework for the Specification and Analysis of Cryptographic-Key Distribution

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
11
0

Year Published

2013
2013
2015
2015

Publication Types

Select...
3
1

Relationship

3
1

Authors

Journals

citations
Cited by 4 publications
(11 citation statements)
references
References 14 publications
0
11
0
Order By: Relevance
“…Key assignment schemes can be classified into keybased schemes and object-based schemes [1]. Key-based schemes focus on keys and the relationship between them.…”
Section: Introductionmentioning
confidence: 99%
See 4 more Smart Citations
“…Key assignment schemes can be classified into keybased schemes and object-based schemes [1]. Key-based schemes focus on keys and the relationship between them.…”
Section: Introductionmentioning
confidence: 99%
“…Sabri and Khedri [1] introduce algebraic structures to specify cryptosystems by specifying the common properties of secrets, ciphers, and keys. Also, they introduce an algebraic structure to specify the interaction between keys and ciphers and another algebraic structure to specify the process of encryption and decryption.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations