Login / Signup

Characterization of Strongly Secure Authenticated Key Exchanges without NAXOS Technique.

Atsushi Fujioka
Published in: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2013)
Keyphrases
  • key exchange protocol
  • authentication scheme
  • key exchange
  • key distribution
  • key agreement protocol
  • secure communication
  • security issues
  • private key
  • information systems
  • third party