The importance of proofs of security for key establishment protocols: Formal analysis of Jan–Chen, Yang–Shen–Shieh, Kim–Huh–Hwang–Lee, Lin–Sun–Hwang, and Yeh–Sun protocols
Kim-Kwang Raymond Choo, Colin Boyd, Yvonne HitchcockVolume:
29
Year:
2006
Language:
english
Pages:
10
DOI:
10.1016/j.comcom.2005.10.030
File:
PDF, 1.11 MB
english, 2006