Sign in

Security Analysis of Key Management Schemes Based on Chinese Remainder Theorem Under Strong Active Outsider Adversary Model.

B. R. PurushothamaArun Prakash VermaAbhilash Kumar
Published in: SSCC (2017)
Keyphrases
  • security analysis
  • security model
  • key management
  • real time
  • smart card
  • key management scheme