Login / Signup
Secrecy of Two-Party Secure Computation.
Yi-Ting Chiang
Da-Wei Wang
Churn-Jung Liau
Tsan-sheng Hsu
Published in:
DBSec (2005)
Keyphrases
</>
key management
key distribution
security analysis
security model
security properties
authentication protocol
user authentication
neural network
sensor networks
lightweight
security issues
cryptographic protocols
diffie hellman
key exchange
key agreement protocol