Login / Signup
Identity-based protocol design patterns for machine-to-machine secure channels.
Francisco Corella
Karen Pomian Lewison
Published in:
CNS (2014)
Keyphrases
</>
design patterns
key distribution
software engineering
object oriented
software systems
databases
cooperative
source code
ad hoc networks
key management
authentication protocol
cryptographic protocols