𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Modeling key compromise impersonation attacks on group key exchange protocols

✍ Scribed by Gorantla, M. C.; Boyd, Colin; Nieto, Juan Manuel González; Manulis, Mark


Book ID
126652149
Publisher
Association for Computing Machinery
Year
2011
Tongue
English
Weight
504 KB
Volume
14
Category
Article
ISSN
1094-9224

No coin nor oath required. For personal study only.


📜 SIMILAR VOLUMES


[Lecture Notes of the Institute for Comp
✍ Sénac, Patrick; Ott, Max; Seneviratne, Aruna 📂 Article 📅 2012 🏛 Springer Berlin Heidelberg 🌐 English ⚖ 187 KB

This book constitutes the thoroughly refereed post-conference proceedings of the First International ICST Conference on Wireless Communications and Applications, ICWCA 2011, held in Sanya, China, in August 2011. The 43 revised full papers presented were carefully reviewed and selected from around 90