Login / Signup
Threshold Anonymous Password-Authenticated Key Exchange Secure against Insider Attacks.
SeongHan Shin
Kazukuni Kobara
Hideki Imai
Published in:
IEICE Trans. Inf. Syst. (2011)
Keyphrases
</>
insider attacks
cryptographic protocols
attack detection
electronic transactions
early detection
insider threat
electronic commerce
enterprise data
customer data