Login / Signup

Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols.

Kim-Kwang Raymond ChooYvonne Hitchcock
Published in: ACISP (2005)
Keyphrases
  • security requirements
  • key establishment
  • security properties
  • information systems
  • sensor networks
  • smart card
  • information security
  • security analysis
  • computer systems
  • security mechanisms