Login / Signup

A key-agreement protocol based on the stack-overflow software vulnerability.

Tamer S. FatayerSherif M. KhattabFatma A. Omara
Published in: ISCC (2010)
Keyphrases