![](/img/cover-not-exists.png)
Weakness in ID-based one round authenticated tripartite multiple-key agreement protocol with pairings
Kyungah Shim, Sungsik WooVolume:
166
Year:
2005
Language:
english
Pages:
8
Journal:
Applied Mathematics and Computation
DOI:
10.1016/j.amc.2004.06.104
File:
PDF, 188 KB
english, 2005