Skip to main content
placeholder image

Constructing strong KEM from weak KEM (or how to revive the KEM/DEM framework)

Conference Paper


Abstract


Publication Date


  • 2008

Citation


  • Baek, J., Galindo, D., Susilo, W. & Zhou, J. (2008). Constructing strong KEM from weak KEM (or how to revive the KEM/DEM framework). In R. Ostrovsky, R. De Prisco & I. Visconti (Eds.), Security and Cryptography for Networks. Sixth International Conference, SCN 2008 (pp. 358-374). Germany: Springer-verlag.

Scopus Eid


  • 2-s2.0-52149091173

Ro Metadata Url


  • http://ro.uow.edu.au/infopapers/3189

Has Global Citation Frequency


Start Page


  • 358

End Page


  • 374

Place Of Publication


  • Germany

Abstract


Publication Date


  • 2008

Citation


  • Baek, J., Galindo, D., Susilo, W. & Zhou, J. (2008). Constructing strong KEM from weak KEM (or how to revive the KEM/DEM framework). In R. Ostrovsky, R. De Prisco & I. Visconti (Eds.), Security and Cryptography for Networks. Sixth International Conference, SCN 2008 (pp. 358-374). Germany: Springer-verlag.

Scopus Eid


  • 2-s2.0-52149091173

Ro Metadata Url


  • http://ro.uow.edu.au/infopapers/3189

Has Global Citation Frequency


Start Page


  • 358

End Page


  • 374

Place Of Publication


  • Germany