Login / Signup
Characterization of Strongly Secure Authenticated Key Exchanges without NAXOS Technique.
Atsushi Fujioka
Published in:
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2013)
Keyphrases
</>
key exchange protocol
authentication scheme
key exchange
key distribution
key agreement protocol
secure communication
security issues
private key
information systems
third party