Login / Signup
Supporting User Evaluation of IT Security Certification Schemes.
Nicholas J. A. Tate
Sharman Lichtenstein
Matthew J. Warren
Published in:
ACIS (2007)
Keyphrases
</>
elliptic curve
key agreement
third party
databases
security properties
network security
security analysis
security protocols
provably secure
key management scheme