Login / Signup

Security weakness in an authenticated group key agreement protocol in two rounds.

Jung Yeon HwangKyu Young ChoiDong Hoon Lee
Published in: Comput. Commun. (2008)
Keyphrases