Login / Signup
Attacks on An ISO/IEC 11770-2 Key Establishment Protocol.
Zhaohui Cheng
Richard Comley
Published in:
Int. J. Netw. Secur. (2006)
Keyphrases
</>
iso iec
international standard
information security
quality evaluation
reference model
security protocols
diffie hellman
information systems
data mining
computational complexity
security mechanisms