Login / Signup

Efficient three-party encrypted key exchange using trapdoor functions.

Tian-Fu LeeI-Pin ChangChing-Cheng Wang
Published in: Secur. Commun. Networks (2013)
Keyphrases
  • key exchange
  • data access
  • security analysis
  • key exchange protocol