Login / Signup
Design and Security Analysis of Anonymous Group Identification Protocols.
Chan H. Lee
Xiaotie Deng
Huafei Zhu
Published in:
Public Key Cryptography (2002)
Keyphrases
</>
security analysis
key exchange
security properties
authentication protocol
databases
case study
software engineering
mutual authentication