Login / Signup
Characterization of Strongly Secure Authenticated Key Exchanges without NAXOS Technique.
Atsushi Fujioka
Published in:
IWSEC (2011)
Keyphrases
</>
key exchange protocol
secure communication
key exchange
authentication scheme
key agreement protocol
key distribution
social networks
high security
block cipher
private key
security issues
key management
secret key
multi party
case study
website
database
encryption key