Sign in

Efficient protocols secure against guessing and replay attacks.

Stephen KeungKai-Yeung Siu
Published in: ICCCN (1995)
Keyphrases
  • security protocols
  • cryptographic protocols
  • security flaws
  • security mechanisms
  • multi party
  • security requirements
  • key management
  • authentication protocol
  • key distribution
  • key exchange
  • cryptographic algorithms