Secure key establishment
From MaRDI portal
Recommendations
Cited in
(7)- A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps
- Progress in Cryptology - INDOCRYPT 2004
- Protocols for authentication and key establishment
- scientific article; zbMATH DE number 5059240 (Why is no real title available?)
- FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes
- Secret Key Generation With Limited Interaction
- Protocols for authentification and key establishment
This page was built for publication: Secure key establishment
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q951129)