Login / Signup

Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach.

Yiu Shing Terry TinColin BoydJuan Manuel González Nieto
Published in: ACISP (2003)
Keyphrases