Login / Signup
On the Use of Key Assignment Schemes in Authentication Protocols
James Alderman
Jason Crampton
Published in:
CoRR (2013)
Keyphrases
</>
authentication protocol
response time
public key
rfid systems