Login / Signup
A Security Weakness in Composite-Order Pairing-Based Protocols with Imbedding Degree k>2.
Neal Koblitz
Published in:
IACR Cryptol. ePrint Arch. (2010)
Keyphrases
</>
communication protocols
database
real time
security issues
data mining
access control
intrusion detection
security policies
security mechanisms
key agreement protocol