Login / Signup
Security analysis of GCM for communication.
Wun-She Yap
Sze Ling Yeo
Swee-Huay Heng
Matt Henricksen
Published in:
Secur. Commun. Networks (2014)
Keyphrases
</>
security analysis
public key
security requirements
high security
smart card
security model
encryption scheme
security properties
authentication protocol
user authentication
image encryption
encryption algorithm
mutual authentication
information sharing
data distribution
low cost
high dimensional