Anonymity and one-way authentication in key exchange protocols View Full Text


Ontology type: schema:ScholarlyArticle      Open Access: True


Article Info

DATE

2013-05

AUTHORS

Ian Goldberg, Douglas Stebila, Berkant Ustaoglu

ABSTRACT

Key establishment is a crucial cryptographic primitive for building secure communication channels between two parties in a network. It has been studied extensively in theory and widely deployed in practice. In the research literature a typical protocol in the public-key setting aims for key secrecy and mutual authentication. However, there are many important practical scenarios where mutual authentication is undesirable, such as in anonymity networks like Tor, or is difficult to achieve due to insufficient public-key infrastructure at the user level, as is the case on the Internet today. In this work we are concerned with the scenario where two parties establish a private shared session key, but only one party authenticates to the other; in fact, the unauthenticated party may wish to have strong anonymity guarantees. We present a desirable set of security, authentication, and anonymity goals for this setting and develop a model which captures these properties. Our approach allows for clients to choose among different levels of authentication. We also describe an attack on a previous protocol of Øverlier and Syverson, and present a new, efficient key exchange protocol that provides one-way authentication and anonymity. More... »

PAGES

245-269

References to SciGraph publications

  • 2005. HMQV: A High-Performance Secure Diffie-Hellman Protocol in ADVANCES IN CRYPTOLOGY – CRYPTO 2005
  • 2003-03. An Efficient Protocol for Authenticated Key Agreement in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2007. Improving Efficiency and Simplicity of Tor Circuit Establishment and Hidden Services in PRIVACY ENHANCING TECHNOLOGIES
  • 2006. On the Security of the Tor Authentication Protocol in PRIVACY ENHANCING TECHNOLOGIES
  • 2006. Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings in INFORMATION SECURITY PRACTICE AND EXPERIENCE
  • 2001-04-15. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels in ADVANCES IN CRYPTOLOGY — EUROCRYPT 2001
  • 2001-07-13. Entity Authentication and Key Distribution in ADVANCES IN CRYPTOLOGY — CRYPTO’ 93
  • 2007. ID-Based Key Agreement with Anonymity for Ad Hoc Networks in EMBEDDED AND UBIQUITOUS COMPUTING
  • 2010. Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement in PAIRING-BASED CRYPTOGRAPHY - PAIRING 2010
  • 2007. Strongly-Secure Identity-Based Key Agreement and Anonymous Extension in INFORMATION SECURITY
  • 1997. Key agreement protocols and their security analysis in CRYTOGRAPHY AND CODING
  • 2003. Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003. Proceedings in NONE
  • 2002-09-13. Security Analysis of IKE’s Signature-Based Key-Exchange Protocol in ADVANCES IN CRYPTOLOGY — CRYPTO 2002
  • 2008. A Modular Security Analysis of the TLS Handshake Protocol in ADVANCES IN CRYPTOLOGY - ASIACRYPT 2008
  • 2000. Authenticated Key Exchange Secure against Dictionary Attacks in ADVANCES IN CRYPTOLOGY — EUROCRYPT 2000
  • 2007. Anonymous Secure Communication in Wireless Mobile Ad-Hoc Networks in UBIQUITOUS CONVERGENCE TECHNOLOGY
  • 2007. Stronger Security of Authenticated Key Exchange in PROVABLE SECURITY
  • Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/s10623-011-9604-z

    DOI

    http://dx.doi.org/10.1007/s10623-011-9604-z

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1032880063


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Data Format", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "University of Waterloo", 
              "id": "https://www.grid.ac/institutes/grid.46078.3d", 
              "name": [
                "Cheriton School of Computer Science, University of Waterloo, Waterloo, ON, Canada"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Goldberg", 
            "givenName": "Ian", 
            "id": "sg:person.012057510223.72", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012057510223.72"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Queensland University of Technology", 
              "id": "https://www.grid.ac/institutes/grid.1024.7", 
              "name": [
                "Information Security Institute, Queensland University of Technology, Brisbane, QLD, Australia"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Stebila", 
            "givenName": "Douglas", 
            "id": "sg:person.014007215772.86", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014007215772.86"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Sabanc\u0131 University", 
              "id": "https://www.grid.ac/institutes/grid.5334.1", 
              "name": [
                "Faculty of Engineering and Natural Sciences, Sabanci University, Istanbul, Turkey"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Ustaoglu", 
            "givenName": "Berkant", 
            "id": "sg:person.015213202013.39", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015213202013.39"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/11689522_19", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1002841682", 
              "https://doi.org/10.1007/11689522_19"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11689522_19", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1002841682", 
              "https://doi.org/10.1007/11689522_19"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-75551-7_9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1009191739", 
              "https://doi.org/10.1007/978-3-540-75551-7_9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-75551-7_9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1009191739", 
              "https://doi.org/10.1007/978-3-540-75551-7_9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-89255-7_5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1012539045", 
              "https://doi.org/10.1007/978-3-540-89255-7_5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-89255-7_5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1012539045", 
              "https://doi.org/10.1007/978-3-540-89255-7_5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-77092-3_29", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1013084534", 
              "https://doi.org/10.1007/978-3-540-77092-3_29"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-77092-3_29", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1013084534", 
              "https://doi.org/10.1007/978-3-540-77092-3_29"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-75496-1_14", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1015153575", 
              "https://doi.org/10.1007/978-3-540-75496-1_14"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-75496-1_14", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1015153575", 
              "https://doi.org/10.1007/978-3-540-75496-1_14"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/238168.238187", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1016443519"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-17455-1_11", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1016698791", 
              "https://doi.org/10.1007/978-3-642-17455-1_11"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-17455-1_11", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1016698791", 
              "https://doi.org/10.1007/978-3-642-17455-1_11"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/1180405.1180454", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1016809227"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/b11817", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1017704698", 
              "https://doi.org/10.1007/b11817"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/b11817", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1017704698", 
              "https://doi.org/10.1007/b11817"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/1880022.1880023", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1021089555"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/bfb0024447", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1023078210", 
              "https://doi.org/10.1007/bfb0024447"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-45539-6_11", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1023793197", 
              "https://doi.org/10.1007/3-540-45539-6_11"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44987-6_28", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1024352177", 
              "https://doi.org/10.1007/3-540-44987-6_28"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44987-6_28", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1024352177", 
              "https://doi.org/10.1007/3-540-44987-6_28"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-48329-2_21", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1027269192", 
              "https://doi.org/10.1007/3-540-48329-2_21"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-48329-2_21", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1027269192", 
              "https://doi.org/10.1007/3-540-48329-2_21"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11535218_33", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1027574053", 
              "https://doi.org/10.1007/11535218_33"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11535218_33", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1027574053", 
              "https://doi.org/10.1007/11535218_33"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11957454_18", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1029515404", 
              "https://doi.org/10.1007/11957454_18"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11957454_18", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1029515404", 
              "https://doi.org/10.1007/11957454_18"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-75670-5_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1041988575", 
              "https://doi.org/10.1007/978-3-540-75670-5_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-75670-5_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1041988575", 
              "https://doi.org/10.1007/978-3-540-75670-5_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-71789-8_15", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1043961948", 
              "https://doi.org/10.1007/978-3-540-71789-8_15"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-45708-9_10", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1046596313", 
              "https://doi.org/10.1007/3-540-45708-9_10"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-45708-9_10", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1046596313", 
              "https://doi.org/10.1007/3-540-45708-9_10"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/996943.996946", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1049767035"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1023/a:1022595222606", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1050148117", 
              "https://doi.org/10.1023/a:1022595222606"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/tit.1976.1055638", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061647862"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1504/ijact.2009.023472", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1067430019"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/risp.1992.213269", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1086349774"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.21236/ada465464", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1091751978"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2013-05", 
        "datePublishedReg": "2013-05-01", 
        "description": "Key establishment is a crucial cryptographic primitive for building secure communication channels between two parties in a network. It has been studied extensively in theory and widely deployed in practice. In the research literature a typical protocol in the public-key setting aims for key secrecy and mutual authentication. However, there are many important practical scenarios where mutual authentication is undesirable, such as in anonymity networks like Tor, or is difficult to achieve due to insufficient public-key infrastructure at the user level, as is the case on the Internet today. In this work we are concerned with the scenario where two parties establish a private shared session key, but only one party authenticates to the other; in fact, the unauthenticated party may wish to have strong anonymity guarantees. We present a desirable set of security, authentication, and anonymity goals for this setting and develop a model which captures these properties. Our approach allows for clients to choose among different levels of authentication. We also describe an attack on a previous protocol of \u00d8verlier and Syverson, and present a new, efficient key exchange protocol that provides one-way authentication and anonymity.", 
        "genre": "research_article", 
        "id": "sg:pub.10.1007/s10623-011-9604-z", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": true, 
        "isPartOf": [
          {
            "id": "sg:journal.1136552", 
            "issn": [
              "0925-1022", 
              "1573-7586"
            ], 
            "name": "Designs, Codes and Cryptography", 
            "type": "Periodical"
          }, 
          {
            "issueNumber": "2", 
            "type": "PublicationIssue"
          }, 
          {
            "type": "PublicationVolume", 
            "volumeNumber": "67"
          }
        ], 
        "name": "Anonymity and one-way authentication in key exchange protocols", 
        "pagination": "245-269", 
        "productId": [
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "9ca2f93c8d7f2d6a54d7d05df8148b5942b4bfae4c01bc6bad93a6df03f703d1"
            ]
          }, 
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/s10623-011-9604-z"
            ]
          }, 
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1032880063"
            ]
          }
        ], 
        "sameAs": [
          "https://doi.org/10.1007/s10623-011-9604-z", 
          "https://app.dimensions.ai/details/publication/pub.1032880063"
        ], 
        "sdDataset": "articles", 
        "sdDatePublished": "2019-04-10T15:52", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8664_00000513.jsonl", 
        "type": "ScholarlyArticle", 
        "url": "http://link.springer.com/10.1007%2Fs10623-011-9604-z"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s10623-011-9604-z'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s10623-011-9604-z'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s10623-011-9604-z'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s10623-011-9604-z'


     

    This table displays all metadata directly associated to this object as RDF triples.

    173 TRIPLES      21 PREDICATES      52 URIs      19 LITERALS      7 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/s10623-011-9604-z schema:about anzsrc-for:08
    2 anzsrc-for:0804
    3 schema:author N7867cdc1fa18433d9743f5114567ad60
    4 schema:citation sg:pub.10.1007/11535218_33
    5 sg:pub.10.1007/11689522_19
    6 sg:pub.10.1007/11957454_18
    7 sg:pub.10.1007/3-540-44987-6_28
    8 sg:pub.10.1007/3-540-45539-6_11
    9 sg:pub.10.1007/3-540-45708-9_10
    10 sg:pub.10.1007/3-540-48329-2_21
    11 sg:pub.10.1007/978-3-540-71789-8_15
    12 sg:pub.10.1007/978-3-540-75496-1_14
    13 sg:pub.10.1007/978-3-540-75551-7_9
    14 sg:pub.10.1007/978-3-540-75670-5_1
    15 sg:pub.10.1007/978-3-540-77092-3_29
    16 sg:pub.10.1007/978-3-540-89255-7_5
    17 sg:pub.10.1007/978-3-642-17455-1_11
    18 sg:pub.10.1007/b11817
    19 sg:pub.10.1007/bfb0024447
    20 sg:pub.10.1023/a:1022595222606
    21 https://doi.org/10.1109/risp.1992.213269
    22 https://doi.org/10.1109/tit.1976.1055638
    23 https://doi.org/10.1145/1180405.1180454
    24 https://doi.org/10.1145/1880022.1880023
    25 https://doi.org/10.1145/238168.238187
    26 https://doi.org/10.1145/996943.996946
    27 https://doi.org/10.1504/ijact.2009.023472
    28 https://doi.org/10.21236/ada465464
    29 schema:datePublished 2013-05
    30 schema:datePublishedReg 2013-05-01
    31 schema:description Key establishment is a crucial cryptographic primitive for building secure communication channels between two parties in a network. It has been studied extensively in theory and widely deployed in practice. In the research literature a typical protocol in the public-key setting aims for key secrecy and mutual authentication. However, there are many important practical scenarios where mutual authentication is undesirable, such as in anonymity networks like Tor, or is difficult to achieve due to insufficient public-key infrastructure at the user level, as is the case on the Internet today. In this work we are concerned with the scenario where two parties establish a private shared session key, but only one party authenticates to the other; in fact, the unauthenticated party may wish to have strong anonymity guarantees. We present a desirable set of security, authentication, and anonymity goals for this setting and develop a model which captures these properties. Our approach allows for clients to choose among different levels of authentication. We also describe an attack on a previous protocol of Øverlier and Syverson, and present a new, efficient key exchange protocol that provides one-way authentication and anonymity.
    32 schema:genre research_article
    33 schema:inLanguage en
    34 schema:isAccessibleForFree true
    35 schema:isPartOf N1d72950ded174b069e3606243af7e2f4
    36 N54ff7bf236e04b4bade9a9596d2f0348
    37 sg:journal.1136552
    38 schema:name Anonymity and one-way authentication in key exchange protocols
    39 schema:pagination 245-269
    40 schema:productId N03827c286b97474d93c865d26062f715
    41 N7ca4cf0bf0bf4c11ad618aa06706c42f
    42 Nf9400720a62c42cfaf0410b4c1c17606
    43 schema:sameAs https://app.dimensions.ai/details/publication/pub.1032880063
    44 https://doi.org/10.1007/s10623-011-9604-z
    45 schema:sdDatePublished 2019-04-10T15:52
    46 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    47 schema:sdPublisher N71a19612f13c4cdd88877ee8f7ec4066
    48 schema:url http://link.springer.com/10.1007%2Fs10623-011-9604-z
    49 sgo:license sg:explorer/license/
    50 sgo:sdDataset articles
    51 rdf:type schema:ScholarlyArticle
    52 N03827c286b97474d93c865d26062f715 schema:name dimensions_id
    53 schema:value pub.1032880063
    54 rdf:type schema:PropertyValue
    55 N1d72950ded174b069e3606243af7e2f4 schema:volumeNumber 67
    56 rdf:type schema:PublicationVolume
    57 N31f6d36fe2a746cf86bd9cb893b7bfce rdf:first sg:person.015213202013.39
    58 rdf:rest rdf:nil
    59 N54ff7bf236e04b4bade9a9596d2f0348 schema:issueNumber 2
    60 rdf:type schema:PublicationIssue
    61 N71a19612f13c4cdd88877ee8f7ec4066 schema:name Springer Nature - SN SciGraph project
    62 rdf:type schema:Organization
    63 N7867cdc1fa18433d9743f5114567ad60 rdf:first sg:person.012057510223.72
    64 rdf:rest Ne27de50b9ee240cc8fd458aef33c95ae
    65 N7ca4cf0bf0bf4c11ad618aa06706c42f schema:name doi
    66 schema:value 10.1007/s10623-011-9604-z
    67 rdf:type schema:PropertyValue
    68 Ne27de50b9ee240cc8fd458aef33c95ae rdf:first sg:person.014007215772.86
    69 rdf:rest N31f6d36fe2a746cf86bd9cb893b7bfce
    70 Nf9400720a62c42cfaf0410b4c1c17606 schema:name readcube_id
    71 schema:value 9ca2f93c8d7f2d6a54d7d05df8148b5942b4bfae4c01bc6bad93a6df03f703d1
    72 rdf:type schema:PropertyValue
    73 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    74 schema:name Information and Computing Sciences
    75 rdf:type schema:DefinedTerm
    76 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
    77 schema:name Data Format
    78 rdf:type schema:DefinedTerm
    79 sg:journal.1136552 schema:issn 0925-1022
    80 1573-7586
    81 schema:name Designs, Codes and Cryptography
    82 rdf:type schema:Periodical
    83 sg:person.012057510223.72 schema:affiliation https://www.grid.ac/institutes/grid.46078.3d
    84 schema:familyName Goldberg
    85 schema:givenName Ian
    86 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012057510223.72
    87 rdf:type schema:Person
    88 sg:person.014007215772.86 schema:affiliation https://www.grid.ac/institutes/grid.1024.7
    89 schema:familyName Stebila
    90 schema:givenName Douglas
    91 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014007215772.86
    92 rdf:type schema:Person
    93 sg:person.015213202013.39 schema:affiliation https://www.grid.ac/institutes/grid.5334.1
    94 schema:familyName Ustaoglu
    95 schema:givenName Berkant
    96 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015213202013.39
    97 rdf:type schema:Person
    98 sg:pub.10.1007/11535218_33 schema:sameAs https://app.dimensions.ai/details/publication/pub.1027574053
    99 https://doi.org/10.1007/11535218_33
    100 rdf:type schema:CreativeWork
    101 sg:pub.10.1007/11689522_19 schema:sameAs https://app.dimensions.ai/details/publication/pub.1002841682
    102 https://doi.org/10.1007/11689522_19
    103 rdf:type schema:CreativeWork
    104 sg:pub.10.1007/11957454_18 schema:sameAs https://app.dimensions.ai/details/publication/pub.1029515404
    105 https://doi.org/10.1007/11957454_18
    106 rdf:type schema:CreativeWork
    107 sg:pub.10.1007/3-540-44987-6_28 schema:sameAs https://app.dimensions.ai/details/publication/pub.1024352177
    108 https://doi.org/10.1007/3-540-44987-6_28
    109 rdf:type schema:CreativeWork
    110 sg:pub.10.1007/3-540-45539-6_11 schema:sameAs https://app.dimensions.ai/details/publication/pub.1023793197
    111 https://doi.org/10.1007/3-540-45539-6_11
    112 rdf:type schema:CreativeWork
    113 sg:pub.10.1007/3-540-45708-9_10 schema:sameAs https://app.dimensions.ai/details/publication/pub.1046596313
    114 https://doi.org/10.1007/3-540-45708-9_10
    115 rdf:type schema:CreativeWork
    116 sg:pub.10.1007/3-540-48329-2_21 schema:sameAs https://app.dimensions.ai/details/publication/pub.1027269192
    117 https://doi.org/10.1007/3-540-48329-2_21
    118 rdf:type schema:CreativeWork
    119 sg:pub.10.1007/978-3-540-71789-8_15 schema:sameAs https://app.dimensions.ai/details/publication/pub.1043961948
    120 https://doi.org/10.1007/978-3-540-71789-8_15
    121 rdf:type schema:CreativeWork
    122 sg:pub.10.1007/978-3-540-75496-1_14 schema:sameAs https://app.dimensions.ai/details/publication/pub.1015153575
    123 https://doi.org/10.1007/978-3-540-75496-1_14
    124 rdf:type schema:CreativeWork
    125 sg:pub.10.1007/978-3-540-75551-7_9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1009191739
    126 https://doi.org/10.1007/978-3-540-75551-7_9
    127 rdf:type schema:CreativeWork
    128 sg:pub.10.1007/978-3-540-75670-5_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1041988575
    129 https://doi.org/10.1007/978-3-540-75670-5_1
    130 rdf:type schema:CreativeWork
    131 sg:pub.10.1007/978-3-540-77092-3_29 schema:sameAs https://app.dimensions.ai/details/publication/pub.1013084534
    132 https://doi.org/10.1007/978-3-540-77092-3_29
    133 rdf:type schema:CreativeWork
    134 sg:pub.10.1007/978-3-540-89255-7_5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1012539045
    135 https://doi.org/10.1007/978-3-540-89255-7_5
    136 rdf:type schema:CreativeWork
    137 sg:pub.10.1007/978-3-642-17455-1_11 schema:sameAs https://app.dimensions.ai/details/publication/pub.1016698791
    138 https://doi.org/10.1007/978-3-642-17455-1_11
    139 rdf:type schema:CreativeWork
    140 sg:pub.10.1007/b11817 schema:sameAs https://app.dimensions.ai/details/publication/pub.1017704698
    141 https://doi.org/10.1007/b11817
    142 rdf:type schema:CreativeWork
    143 sg:pub.10.1007/bfb0024447 schema:sameAs https://app.dimensions.ai/details/publication/pub.1023078210
    144 https://doi.org/10.1007/bfb0024447
    145 rdf:type schema:CreativeWork
    146 sg:pub.10.1023/a:1022595222606 schema:sameAs https://app.dimensions.ai/details/publication/pub.1050148117
    147 https://doi.org/10.1023/a:1022595222606
    148 rdf:type schema:CreativeWork
    149 https://doi.org/10.1109/risp.1992.213269 schema:sameAs https://app.dimensions.ai/details/publication/pub.1086349774
    150 rdf:type schema:CreativeWork
    151 https://doi.org/10.1109/tit.1976.1055638 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061647862
    152 rdf:type schema:CreativeWork
    153 https://doi.org/10.1145/1180405.1180454 schema:sameAs https://app.dimensions.ai/details/publication/pub.1016809227
    154 rdf:type schema:CreativeWork
    155 https://doi.org/10.1145/1880022.1880023 schema:sameAs https://app.dimensions.ai/details/publication/pub.1021089555
    156 rdf:type schema:CreativeWork
    157 https://doi.org/10.1145/238168.238187 schema:sameAs https://app.dimensions.ai/details/publication/pub.1016443519
    158 rdf:type schema:CreativeWork
    159 https://doi.org/10.1145/996943.996946 schema:sameAs https://app.dimensions.ai/details/publication/pub.1049767035
    160 rdf:type schema:CreativeWork
    161 https://doi.org/10.1504/ijact.2009.023472 schema:sameAs https://app.dimensions.ai/details/publication/pub.1067430019
    162 rdf:type schema:CreativeWork
    163 https://doi.org/10.21236/ada465464 schema:sameAs https://app.dimensions.ai/details/publication/pub.1091751978
    164 rdf:type schema:CreativeWork
    165 https://www.grid.ac/institutes/grid.1024.7 schema:alternateName Queensland University of Technology
    166 schema:name Information Security Institute, Queensland University of Technology, Brisbane, QLD, Australia
    167 rdf:type schema:Organization
    168 https://www.grid.ac/institutes/grid.46078.3d schema:alternateName University of Waterloo
    169 schema:name Cheriton School of Computer Science, University of Waterloo, Waterloo, ON, Canada
    170 rdf:type schema:Organization
    171 https://www.grid.ac/institutes/grid.5334.1 schema:alternateName Sabancı University
    172 schema:name Faculty of Engineering and Natural Sciences, Sabanci University, Istanbul, Turkey
    173 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...