Login / Signup

Efficient Authenticators with Application to Key Exchange.

Shaoquan JiangGuang Gong
Published in: ICISC (2005)
Keyphrases
  • key exchange
  • security analysis
  • lightweight
  • intrusion detection