Login / Signup
End-to-End Authenticated Key Exchange Based on Different Physical Unclonable Functions.
Jin Wook Byun
Published in:
IEEE Access (2019)
Keyphrases
</>
end to end
key exchange
key exchange protocol
security analysis
diffie hellman
wireless ad hoc networks
password based authenticated key exchange
congestion control
secure communication
digital signature
multi hop
key distribution
multipath
standard model
ad hoc networks
distributed systems
real time