Login / Signup

Room at the Bottom: Authenticated Encryption on Slow Legacy Networks.

Sean W. Smith
Published in: IEEE Secur. Priv. (2011)
Keyphrases
  • key exchange
  • network topologies
  • network analysis
  • data sets
  • peer to peer
  • complex systems
  • computer networks
  • heterogeneous networks
  • authentication scheme