Login / Signup
Logical analysis of AUTHMAC_DH: a new protocol for authentication and key distribution.
Heba Kamal Aslan
Published in:
Comput. Secur. (2004)
Keyphrases
</>
key distribution
authentication protocol
key management
elliptic curve
group communication
real time
secret key
security mechanisms
security protocols
trusted third party