Sign in

Threshold Anonymous Password-Authenticated Key Exchange Secure against Insider Attacks.

SeongHan ShinKazukuni KobaraHideki Imai
Published in: IEICE Trans. Inf. Syst. (2011)
Keyphrases
  • insider attacks
  • cryptographic protocols
  • attack detection
  • electronic transactions
  • early detection
  • insider threat
  • electronic commerce
  • enterprise data
  • customer data