Efficient network authentication protocols: Lower bounds and optimal implementations
From MaRDI portal
Publication:5137012
DOI10.1007/s004460050015zbMath1448.68052OpenAlexW2039471385MaRDI QIDQ5137012
Publication date: 30 November 2020
Published in: Distributed Computing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s004460050015
Data encryption (aspects in computer science) (68P25) Network protocols (68M12) Computer security (68M25)
Related Items (4)
Towards secure quantum key distribution protocol for wireless LANs: a hybrid approach ⋮ A novel quantum dragonfly multi-key exchange protocol beyond conventional attacks ⋮ Enhancing the security of password authenticated key agreement protocols based on chaotic maps ⋮ Simple password-based three-party authenticated key exchange without server public keys
Cites Work
This page was built for publication: Efficient network authentication protocols: Lower bounds and optimal implementations