Login / Signup
Human Computing for Handling Strong Corruptions in Authenticated Key Exchange.
Alexandra Boldyreva
Shan Chen
Pierre-Alain Dupont
David Pointcheval
Published in:
CSF (2017)
Keyphrases
</>
key exchange
security analysis
key exchange protocol
diffie hellman
password based authenticated key exchange
encryption scheme
secure communication
database systems
digital signature
key distribution
wireless sensor networks
digital images
public key