Login / Signup
Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols.
M. Choudary Gorantla
Colin Boyd
Juan Manuel González Nieto
Published in:
Public Key Cryptography (2009)
Keyphrases
</>
key exchange
security analysis
secure communication
security protocols
smart card
authentication protocol
private key
digital signature
cryptographic protocols
security mechanisms
diffie hellman
public key
key distribution
security properties
key exchange protocol
security requirements
key technologies