Login / Signup

A Secure and Efficient Searching Scheme for Trusted Nodes in a Peer-to-Peer Network.

Jaydip Sen
Published in: CISIS (2011)
Keyphrases
  • authentication scheme
  • provably secure
  • security analysis
  • authentication protocol
  • diffie hellman
  • key establishment
  • standard model