Authentication and authenticated key exchanges
Designs, Codes and Cryptography
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Hi-index | 0.00 |
. Historic look at design principles and requirements for a practical key management communication protocol. Refinement of terms, threat environment and limitations, and necessary features. Dynamic computational time and network round-trip time are well integrated with protocol specification. First use of anti-clogging tokens to defend against resource attacks.