• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

An Effectively Applicable to Resource Constrained Devices and Semi-Trusted Servers Authenticated Key Agreement Scheme.

Dong XieJinghua YangBin WuWeixin BianFulong ChenTaochun Wang
Published in: IEEE Trans. Inf. Forensics Secur. (2024)
Keyphrases