Login / Signup
Secure Authentication from a Weak Key, Without Leaking Information.
Niek J. Bouman
Serge Fehr
Published in:
IACR Cryptol. ePrint Arch. (2011)
Keyphrases
</>
information sources
information sharing
sensitive information
social networks
prior knowledge
wireless sensor networks
security analysis
standard model