Search
Now showing items 1-1 of 1
Modeling and detecting attacks against key agreement protocols
(Dhirubhai Ambani Institute of Information and Communication Technology, 2012)
Key agreement protocols establish a shared secret key between two or more communicating
parties willing to exchange data over insecure channels using symmetric key cryptography.
Based on the number of members involved ...