Login / Signup

Identity-based protocol design patterns for machine-to-machine secure channels.

Francisco CorellaKaren Pomian Lewison
Published in: CNS (2014)
Keyphrases
  • design patterns
  • key distribution
  • software engineering
  • object oriented
  • software systems
  • databases
  • cooperative
  • source code
  • ad hoc networks
  • key management
  • authentication protocol
  • cryptographic protocols