Changing thresholds in the absence of secure channels. / Martin, Keith M.; Pieprzyk, J.; Safavi-Naini, R.; Wang, H.

Information Security and Privacy, 4th Australasian Conference, ACISP99. Vol. 1587 Springer, 1999. p. 177-191 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingChapter

Published

Standard

Changing thresholds in the absence of secure channels. / Martin, Keith M.; Pieprzyk, J.; Safavi-Naini, R.; Wang, H.

Information Security and Privacy, 4th Australasian Conference, ACISP99. Vol. 1587 Springer, 1999. p. 177-191 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingChapter

Harvard

Martin, KM, Pieprzyk, J, Safavi-Naini, R & Wang, H 1999, Changing thresholds in the absence of secure channels. in Information Security and Privacy, 4th Australasian Conference, ACISP99. vol. 1587, Lecture Notes in Computer Science, Springer, pp. 177-191. https://doi.org/10.1007/3-540-48970-3_15

APA

Martin, K. M., Pieprzyk, J., Safavi-Naini, R., & Wang, H. (1999). Changing thresholds in the absence of secure channels. In Information Security and Privacy, 4th Australasian Conference, ACISP99 (Vol. 1587, pp. 177-191). (Lecture Notes in Computer Science). Springer. https://doi.org/10.1007/3-540-48970-3_15

Vancouver

Martin KM, Pieprzyk J, Safavi-Naini R, Wang H. Changing thresholds in the absence of secure channels. In Information Security and Privacy, 4th Australasian Conference, ACISP99. Vol. 1587. Springer. 1999. p. 177-191. (Lecture Notes in Computer Science). https://doi.org/10.1007/3-540-48970-3_15

Author

Martin, Keith M. ; Pieprzyk, J. ; Safavi-Naini, R. ; Wang, H. / Changing thresholds in the absence of secure channels. Information Security and Privacy, 4th Australasian Conference, ACISP99. Vol. 1587 Springer, 1999. pp. 177-191 (Lecture Notes in Computer Science).

BibTeX

@inbook{510aa7efe66e444e83ca54a8469f4c01,
title = "Changing thresholds in the absence of secure channels",
author = "Martin, {Keith M.} and J. Pieprzyk and R. Safavi-Naini and H. Wang",
year = "1999",
doi = "10.1007/3-540-48970-3_15",
language = "English",
volume = "1587",
series = "Lecture Notes in Computer Science",
publisher = "Springer",
pages = "177--191",
booktitle = "Information Security and Privacy, 4th Australasian Conference, ACISP99",

}

RIS

TY - CHAP

T1 - Changing thresholds in the absence of secure channels

AU - Martin, Keith M.

AU - Pieprzyk, J.

AU - Safavi-Naini, R.

AU - Wang, H.

PY - 1999

Y1 - 1999

U2 - 10.1007/3-540-48970-3_15

DO - 10.1007/3-540-48970-3_15

M3 - Chapter

VL - 1587

T3 - Lecture Notes in Computer Science

SP - 177

EP - 191

BT - Information Security and Privacy, 4th Australasian Conference, ACISP99

PB - Springer

ER -