Login / Signup
Security Analysis of Poker-Resembled Protocol Based on Hidden Number Problem.
Dong Su
Kewei Lv
Published in:
CSO (2) (2009)
Keyphrases
</>
security analysis
security model
lightweight
user authentication
high security
database systems
smart card
computer networks
security requirements
public key
image encryption