Login / Signup

Round-Efficient Conference Key Agreement Protocols with Provable Security.

Wen-Guey TzengZhi-Jia Tzeng
Published in: ASIACRYPT (2000)
Keyphrases
  • key agreement protocol
  • provably secure
  • diffie hellman
  • intrusion detection
  • security properties
  • network security
  • key management
  • information security
  • security policies