Login / Signup

Logical analysis of AUTHMAC_DH: a new protocol for authentication and key distribution.

Heba Kamal Aslan
Published in: Comput. Secur. (2004)
Keyphrases
  • key distribution
  • authentication protocol
  • key management
  • elliptic curve
  • group communication
  • real time
  • secret key
  • security mechanisms
  • security protocols
  • trusted third party