Login / Signup

Timed Encryption with Application to Deniable Key Exchange.

Shaoquan Jiang
Published in: TAMC (2012)
Keyphrases
  • key exchange
  • security analysis
  • real time
  • data management
  • cost effective
  • authentication protocol