Login / Signup

An Effectively Applicable to Resource Constrained Devices and Semi-Trusted Servers Authenticated Key Agreement Scheme.

Dong XieJinghua YangBin WuWeixin BianFulong ChenTaochun Wang
Published in: IEEE Trans. Inf. Forensics Secur. (2024)
Keyphrases