Login / Signup

Design and Security Analysis of Anonymous Group Identification Protocols.

Chan H. LeeXiaotie DengHuafei Zhu
Published in: Public Key Cryptography (2002)
Keyphrases
  • security analysis
  • key exchange
  • security properties
  • authentication protocol
  • databases
  • case study
  • software engineering
  • mutual authentication