Login / Signup

Modeling key compromise impersonation attacks on group key exchange protocols.

M. Choudary GorantlaColin BoydJuan Manuel González NietoMark Manulis
Published in: ACM Trans. Inf. Syst. Secur. (2011)
Keyphrases