Login / Signup
Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols.
Kim-Kwang Raymond Choo
Yvonne Hitchcock
Published in:
ACISP (2005)
Keyphrases
</>
security requirements
key establishment
security properties
information systems
sensor networks
smart card
information security
security analysis
computer systems
security mechanisms