Login / Signup

The importance of proofs of security for key establishment protocols: Formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols.

Kim-Kwang Raymond ChooColin BoydYvonne Hitchcock
Published in: Comput. Commun. (2006)
Keyphrases