Login / Signup
Room at the Bottom: Authenticated Encryption on Slow Legacy Networks.
Sean W. Smith
Published in:
IEEE Secur. Priv. (2011)
Keyphrases
</>
key exchange
network topologies
network analysis
data sets
peer to peer
complex systems
computer networks
heterogeneous networks
authentication scheme